www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-06-16T09:25:48+00:00 www.secnews.physaphae.fr IndustrialCyber - cyber risk firms for industrial Nozomi annonce les principaux risques dans les HMI basés sur le navigateur, conclut l'étude CVE avec Ailux RTU62351B<br>Nozomi announces top risks in browser-based HMIs, concludes CVE study with AiLux RTU62351B Nozomi Networks Labs a décrit les onze principaux risques de la mise en œuvre d'HMI basés sur un navigateur dans des paramètres OT (technologie opérationnelle), ...
>Nozomi Networks Labs outlined the top eleven risks of implementing browser-based HMIs in controlled OT (operational technology) settings,... ]]>
2024-06-14T17:12:20+00:00 https://industrialcyber.co/industrial-cyber-attacks/nozomi-announces-top-risks-in-browser-based-hmis-concludes-cve-study-with-ailux-rtu62351b/ www.secnews.physaphae.fr/article.php?IdArticle=8518091 False Studies,Industrial None None
InfoSecurity Mag - InfoSecurity Magazine Élections générales au Royaume-Uni: l'expert en politique technologique appelle à la refonte du droit pour lutter<br>UK General Election: Tech Policy Expert Calls for Law Overhaul to Combat Deepfakes Governments should “police the content rather than the technology used to create it,” Matthew Feeney from the Centre for Policy Studies argued in a new paper]]> 2024-06-14T13:30:00+00:00 https://www.infosecurity-magazine.com/news/uk-election-law-overhaul-combat/ www.secnews.physaphae.fr/article.php?IdArticle=8517967 False Studies None None Global Security Mag - Site de news francais Jeux olympiques, télétravail et sécurité<br>Olympic Games, teleworking and security opinion
With the Paris 2024 Olympic Games just a few months away, the party\'s in full swing. Businesses are preparing for it too: according to a Yousign study in partnership with IPSOS, 20% of companies in the Paris region have decided to use digital solutions to facilitate remote working. This will save time for sports fans, who will be able to follow sporting events more easily. But there is a danger lurking: the security of data and access linked to remote working. As we prepare for Paris, data (...) - Opinion]]>
2024-06-13T13:48:18+00:00 https://www.globalsecuritymag.fr/olympic-games-teleworking-and-security.html www.secnews.physaphae.fr/article.php?IdArticle=8517277 False Studies None 2.0000000000000000
Global Security Mag - Site de news francais Les entreprises qui ont fait de l'avance avec un déploiement d'IA malgré les lacunes dans la gouvernance des données et les problèmes de sécurité<br>Enterprises Plowing Ahead with AI Deployment Despite Gaps in Data Governance and Security Concerns rapports spéciaux
F5 Study released a new report that provides a unique view into the current state of enterprise AI adoption. F5\'s 2024 State of AI Application Strategy Report reveals that while 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices. Data and the systems companies put in place to obtain, store, and secure it are critical to the successful adoption and optimization of AI. "AI is a disruptive force, enabling companies to (...) - Special Reports]]>
2024-06-12T15:41:54+00:00 https://www.globalsecuritymag.fr/enterprises-plowing-ahead-with-ai-deployment-despite-gaps-in-data-governance.html www.secnews.physaphae.fr/article.php?IdArticle=8517285 False Studies None 2.0000000000000000
Global Security Mag - Site de news francais un rapport de Splunk révèle que les temps d\'arrêt coûtent chaque année 400 milliards de dollars aux entreprises du Global 2000 Investigations]]> 2024-06-12T09:31:35+00:00 https://www.globalsecuritymag.fr/un-rapport-de-splunk-revele-que-les-temps-d-arret-coutent-chaque-annee-400.html www.secnews.physaphae.fr/article.php?IdArticle=8517291 False Studies None 4.0000000000000000 IT Security Guru - Blog Sécurité Stratégies pour gérer et réduire la fatigue des alertes dans les SOC<br>Strategies to Manage and Reduce Alert Fatigue in SOCs stratégies à gérer etRéduire la fatigue des alertes dans les SOC Apparu pour la première fois sur gourou de la sécurité informatique .
The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two years due to stress and burnout. Alert fatigue significantly contributes to staff burnout at Security […] The post Strategies to Manage and Reduce Alert Fatigue in SOCs first appeared on IT Security Guru. ]]>
2024-06-11T11:40:52+00:00 https://www.itsecurityguru.org/2024/06/11/strategies-to-manage-and-reduce-alert-fatigue-in-socs/?utm_source=rss&utm_medium=rss&utm_campaign=strategies-to-manage-and-reduce-alert-fatigue-in-socs www.secnews.physaphae.fr/article.php?IdArticle=8516708 False Studies None 3.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain LLMS agissant trompeusement<br>LLMs Acting Deceptively Les capacités de déception ont émergé dans des modèles de grande langue & # 8220;: Résumé: Les modèles de grandes langues (LLM) sont actuellement à l'avant-garde des systèmes d'IA entrelacés avec la communication humaine et la vie quotidienne.Ainsi, les aligner sur les valeurs humaines est d'une grande importance.Cependant, étant donné l'augmentation constante des capacités de raisonnement, les futurs LLM sont soupçonnés de devenir en mesure de tromper les opérateurs humains et d'utiliser cette capacité à contourner les efforts de surveillance.En tant que condition préalable à cela, les LLM doivent posséder une compréhension conceptuelle des stratégies de tromperie.Cette étude révèle que de telles stratégies ont émergé dans les LLM de pointe, mais étaient inexistantes dans les LLM antérieures.Nous mettons une série d'expériences montrant que les LLM de pointe sont capables de comprendre et d'induire de fausses croyances dans d'autres agents, que leur performance dans des scénarios de tromperie complexes peut être amplifiée en utilisant un raisonnement en chaîne de pensées, et que le machiavélilenisme provoquant la création de machiavéliciennedans les LLMS peut déclencher un comportement trompeur mal aligné.Le GPT-4, par exemple, présente un comportement trompeur dans des scénarios de test simples 99,16% du temps (p & # 60; 0,001).Dans des scénarios de test de déception de second ordre complexes où l'objectif est d'induire quelqu'un qui s'attend à être trompé, GPT-4 recoure un comportement trompeur de 71,46% du temps (P & # 60; 0,001) lorsqu'il est augmenté avec un raisonnement en chaîne de pensées.En somme, révélant un comportement de machine jusque-là inconnu dans les LLM, notre étude contribue au champ naissant de la psychologie de la machine ...
New research: “Deception abilities emerged in large language models“: Abstract: Large language models (LLMs) are currently at the forefront of intertwining AI systems with human communication and everyday life. Thus, aligning them with human values is of great importance. However, given the steady increase in reasoning abilities, future LLMs are under suspicion of becoming able to deceive human operators and utilizing this ability to bypass monitoring efforts. As a prerequisite to this, LLMs need to possess a conceptual understanding of deception strategies. This study reveals that such strategies emerged in state-of-the-art LLMs, but were nonexistent in earlier LLMs. We conduct a series of experiments showing that state-of-the-art LLMs are able to understand and induce false beliefs in other agents, that their performance in complex deception scenarios can be amplified utilizing chain-of-thought reasoning, and that eliciting Machiavellianism in LLMs can trigger misaligned deceptive behavior. GPT-4, for instance, exhibits deceptive behavior in simple test scenarios 99.16% of the time (P < 0.001). In complex second-order deception test scenarios where the aim is to mislead someone who expects to be deceived, GPT-4 resorts to deceptive behavior 71.46% of the time (P < 0.001) when augmented with chain-of-thought reasoning. In sum, revealing hitherto unknown machine behavior in LLMs, our study contributes to the nascent field of machine psychology...]]>
2024-06-11T11:02:09+00:00 https://www.schneier.com/blog/archives/2024/06/llms-acting-deceptively.html www.secnews.physaphae.fr/article.php?IdArticle=8517161 False Studies None 3.0000000000000000
SlashNext - Cyber Firm Le rapport du groupe Tolly met en évidence Slashnext \\'s Gen Ai Powered Email Security Prowess<br>The Tolly Group Report Highlights SlashNext\\'s Gen AI-Powered Email Security Prowess Dans le paysage en constante évolution des cyber-états, le courrier électronique reste une cible principale pour les acteurs malveillants, avec des compromis par courrier électronique de zéro heure (BEC) et des attaques de phishing avancées posant des risques importants pour les organisations.Une récente étude indépendante du groupe Tolly, commandée par Slashnext, met en évidence la solution de sécurité par e-mail de cloud (ICE) alimentée par la société, démontrant sa supérieure [& # 8230;] Le post Le rapport du groupe Tolly met en évidence Slashnext \'s Gen's Gen's Gen'sLes prouesses de sécurité par e-mail à Ai-Email sont apparues pour la première fois sur slashnext .
>In the ever-evolving landscape of cyberthreats, email remains a prime target for malicious actors, with zero-hour Business Email Compromise (BEC) and advanced phishing attacks posing significant risks to organizations. A recent independent study by The Tolly Group, commissioned by SlashNext, highlights the company’s Gen AI powered Integrated Cloud Email Security (ICES) solution, demonstrating its superior […] The post The Tolly Group Report Highlights SlashNext\'s Gen AI-Powered Email Security Prowess first appeared on SlashNext.]]>
2024-06-10T21:44:37+00:00 https://slashnext.com/blog/tolly-report-highlights-slashnexts-gen-ai-powered-email-security-prowess/ www.secnews.physaphae.fr/article.php?IdArticle=8516537 False Studies,Cloud None 3.0000000000000000
Cyber Skills - Podcast Cyber Gardeing Ireland \\'s Industrial Backbone: le rôle de la technologie opérationnelle.<br>Guarding Ireland\\'s Industrial Backbone: The Role of Operational Technology. Check out UL Professor Tom Newe\'s insightful piece published in Silicon Republic. Tom is a Professor in the Department of Electronic and Computer Engineering at University of Limerick, a project partner of Cyber Skills, sheds light on the pressing security challenges faced by legacy operational technology (OT) systems and the alarming rise in cyberattacks targeting industrial systems. In his article, Tom emphasizes the critical need for personnel skilled in OT security, highlighting the significant gap in experienced professionals in this rapidly growing area. As industries continue to integrate OT with IT networks-a process known as IT-OT convergence-the complexity of securing these environments increases, making specialized training and education programs more important than ever. Tom discusses how this paradigm is gradually shifting thanks to Irish Government initiatives like the Higher Education Authority Human Capital Initiative (HEA-HCI), which now provides 80% funding for cybersecurity courses at partner universities, MTU, UL and TUD. This funding empowers universities across Ireland to address industry skill gaps and develop comprehensive training programs. One such program is the Professional Diploma in OT Security, a collaboration between Graduate and Professional Studies at the University of Limerick and Cyber Skills. This course specifically targets the cybersecurity needs of integrated IT-OT systems. Participants have the opportunity to use advanced cyber range infrastructure, providing an on-site simulation solution to model both IT and OT environments. These simulations facilitate realistic scenario training, including genuine cyberattacks, helping participants develop practical skills t]]> 2024-06-07T00:00:00+00:00 https://www.cyberskills.ie/explore/news/guarding-irelands-industrial-backbone-the-role-of-operational-technology.html www.secnews.physaphae.fr/article.php?IdArticle=8517382 False Studies,Industrial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Déballage des prédictions de la menace SaaS de 2024 \\<br>Unpacking 2024\\'s SaaS Threat Predictions Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year, several SaaS threat predictions from the report have already proven accurate. Fortunately, SaaS Security Posture Management (SSPM) solutions have prioritized mitigation capabilities to address many of]]> 2024-06-05T16:30:00+00:00 https://thehackernews.com/2024/06/unpacking-2024s-saas-threat-predictions.html www.secnews.physaphae.fr/article.php?IdArticle=8513617 False Threat,Studies,Cloud None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant Phishing pour l'or: cyber-menaces auxquelles sont confrontés les Jeux olympiques de Paris 2024<br>Phishing for Gold: Cyber Threats Facing the 2024 Paris Olympics   Executive Summary  Mandiant assesses with high confidence that the Paris Olympics faces an elevated risk of cyber threat activity, including cyber espionage, disruptive and destructive operations, financially-motivated activity, hacktivism, and information operations.  Olympics-related cyber threats could realistically impact various targets including event organizers and sponsors, ticketing systems, Paris infrastructure, and athletes and spectators traveling to the event.  Mandiant assesses with high confidence that Russian threat groups pose the highest risk to the Olympics. While China, Iran, and North Korea state sponsored actors also pose a moderate to low risk. To reduce the risk of cyber threats associated with the Paris Olympics, organizations should update their threat profiles, conduct security awareness training, and consider travel-related cyber risks. The security community is better prepared for the cyber threats facing the Paris Olympics than it has been for previous Games, thanks to the insights gained from past events. While some entities may face unfamiliar state-sponsored threats, many of the cybercriminal threats will be familiar. While the technical disruption caused by hacktivism and information operations is often temporary, these operations can have an outsized impact during high-profile events with a global audience. Introduction  The 2024 Summer Olympics taking place in Paris, France between July and August creates opportunities for a range of cyber threat actors to pursue profit, notoriety, and intelligence. For organizations involved in the event, understanding relevant threats is key to developing a resilient security posture. Defenders should prepare against a variety of threats that will likely be interested in targeting the Games for different reasons:  Cyber espionage groups are likely to target the 2024 Olympics for information gathering purposes, due to the volume of government officials and senior decision makers attending. Disruptive and destructive operations could potentially target the Games to cause negative psychological effects and reputational damage. This type of activity could take the form of website defacements, distributed denial of service (DDoS) attacks, the deployment of wiper malware, and operational technology (OT) targeting. As a high profile, large-scale sporting event with a global audience, the Olympics represents an ideal stage for such operations given that the impact of any disruption would be significantly magnified.  Information operations will likely leverage interest in the Olympics to spread narratives and disinformation to target audiences. In some cases, threat actors may leverage disruptive and destructive attacks to amplify the spread of particular narratives in hybrid operations. Financially-motivated actors are likely to target the Olympics in v]]> 2024-06-05T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-2024-paris-olympics/ www.secnews.physaphae.fr/article.php?IdArticle=8513588 False Ransomware,Malware,Threat,Studies,Mobile,Cloud,Technical APT 31,APT 42,APT 15 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les prises de compte dépassent les ransomwares en tant que préoccupation de sécurité supérieure<br>Account Takeovers Outpace Ransomware as Top Security Concern The latest Abnormal Security report shows 83% of firms faced at least one account takeover in the past year]]> 2024-06-04T15:30:00+00:00 https://www.infosecurity-magazine.com/news/ato-outpace-ransomware-top/ www.secnews.physaphae.fr/article.php?IdArticle=8513102 False Ransomware,Studies None 4.0000000000000000 Global Security Mag - Site de news francais OpenText Cybersecurity dévoile son rapport 2024 sur les menaces émergentes et la résilience cybernétique Malwares]]> 2024-06-04T08:04:21+00:00 https://www.globalsecuritymag.fr/opentext-cybersecurity-devoile-son-rapport-2024-sur-les-menaces-emergentes-et.html www.secnews.physaphae.fr/article.php?IdArticle=8512881 False Threat,Studies None 4.0000000000000000 Global Security Mag - Site de news francais ESET publie un rapport démontrant l\'intensification des cyberattaques liées à l\'Iran, à la Russie et à la Chine, d\'octobre 2023 à mars 2024 Malwares]]> 2024-06-04T07:46:43+00:00 https://www.globalsecuritymag.fr/eset-publie-un-rapport-demontrant-l-intensification-des-cyberattaques-liees-a-l.html www.secnews.physaphae.fr/article.php?IdArticle=8512850 False Studies None 4.0000000000000000 knowbe4 - cybersecurity services 91% de chaque attaque de ransomware aujourd'hui comprend l'exfiltration de vos données<br>91% of Every Ransomware Attack Today Includes Exfiltrating Your Data De nouvelles informations sur les attaques de ransomwares montrent que les cyberattaques sont une préoccupation majeure pour les organisations & # 8211;avec beaucoup de choses qui ne savent pas qu'ils étaient victimes qu'après l'attaque.
Nearly Every Ransomware Attack Today Includes Exfiltrating Your Data New insight into ransomware attacks show that cyber attacks are a top concern for organizations – with many not aware they were a victim until after the attack.]]>
2024-05-31T17:43:03+00:00 https://blog.knowbe4.com/nearly-every-ransomware-attack-today-includes-exfiltrating-your-data www.secnews.physaphae.fr/article.php?IdArticle=8510730 False Ransomware,Studies None 3.0000000000000000
HackRead - Chercher Cyber Mots de passe de la culture pop les plus susceptibles de vous faire pirater, nouvelle étude<br>Pop Culture Passwords Most Likely to Get You Hacked, New Study Par deeba ahmed est votre mot de passe & # 8220; Superman & # 8221;ou & # 8220; Blink-182 & # 8221;?Des millions utilisent ces favoris de la culture pop, ce qui en fait des cibles faciles pour les pirates. & # 8230; Ceci est un article de HackRead.com Lire le post original: pop culture popMots de passe les plus susceptibles de vous faire pirater, nouvelle étude
>By Deeba Ahmed Is your password “Superman” or “Blink-182”? Millions are using these pop-culture favorites, making them easy targets for hackers.… This is a post from HackRead.com Read the original post: Pop Culture Passwords Most Likely to Get You Hacked, New Study]]>
2024-05-30T12:21:18+00:00 https://hackread.com/pop-culture-passwords-get-you-hacked/ www.secnews.physaphae.fr/article.php?IdArticle=8509989 False Studies None 2.0000000000000000
Global Security Mag - Site de news francais Les organismes de santé perdent 20 % de leurs données sensibles lors de chaque attaque de ransomware, selon Rubrik Zero Labs Malwares]]> 2024-05-30T07:08:11+00:00 https://www.globalsecuritymag.fr/les-organismes-de-sante-perdent-20-de-leurs-donnees-sensibles-lors-de-chaque.html www.secnews.physaphae.fr/article.php?IdArticle=8509871 False Ransomware,Studies None 4.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) La nouvelle recherche met en garde contre la faible gestion du conjoint et les risques d'initiés<br>New Research Warns About Weak Offboarding Management and Insider Risks A recent study by Wing Security found that 63% of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks.  Employee offboarding is typically seen as a routine administrative task, but it can pose substantial security risks, if not handled correctly. Failing to quickly and thoroughly remove access for]]> 2024-05-29T17:01:00+00:00 https://thehackernews.com/2024/05/new-research-warns-about-weak.html www.secnews.physaphae.fr/article.php?IdArticle=8509280 False Studies,Cloud None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le rapport révèle une augmentation de 341% des attaques de phishing avancées<br>Report Reveals 341% Rise in Advanced Phishing Attacks This data comes from SlashNext\'s mid-year State of Phishing 2024 report]]> 2024-05-22T16:15:00+00:00 https://www.infosecurity-magazine.com/news/341-rise-advanced-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8504876 False Studies None 3.0000000000000000 Global Security Mag - Site de news francais Près de la moitié des violations de données dans les organisations financières proviennent du cloud, coûtant en moyenne 5,5 millions d\'euros par an Investigations]]> 2024-05-22T08:31:14+00:00 https://www.globalsecuritymag.fr/pres-de-la-moitie-des-violations-de-donnees-dans-les-organisations-financieres.html www.secnews.physaphae.fr/article.php?IdArticle=8504604 False Studies,Cloud None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les ransomwares et les hacks alimentés par AI stimulent le cyber-investissement<br>Ransomware and AI-Powered Hacks Drive Cyber Investment The rise in ransomware and AI generated attacks has contributed to accelerate investment into cyber defenses, Infosecurity Europe found in a new study]]> 2024-05-21T14:15:00+00:00 https://www.infosecurity-magazine.com/news/ransomware-ai-cyber-investment/ www.secnews.physaphae.fr/article.php?IdArticle=8504104 False Ransomware,Studies None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant Trous dans votre bitbucket: pourquoi votre pipeline CI / CD fuit des secrets<br>Holes in Your Bitbucket: Why Your CI/CD Pipeline Is Leaking Secrets   While investigating recent exposures of Amazon Web Services (AWS) secrets, Mandiant identified a scenario in which client-specific secrets have been leaked from Atlassian\'s code repository tool, Bitbucket, and leveraged by threat actors to gain unauthorized access to AWS. This blog post illustrates how Bitbucket Secured Variables can be leaked in your pipeline and expose you to security breaches.  Background Bitbucket is a code hosting platform provided by Atlassian and is equipped with a built-in continuous integration and continuous delivery/deployment (CI/CD) service called Bitbucket Pipelines. Bitbucket Pipelines can be used to execute CI/CD use cases like deploying and maintaining resources in AWS. Bitbucket includes an administrative function called "Secured Variables" that allows administrators to store CI/CD secrets, such as AWS keys, directly in Bitbucket for easy reference by code libraries.  CI/CD Secrets: CI/CD Secrets serve as the authentication and authorization backbone within CI/CD pipelines. They provide the credentials required for pipelines to interact with platforms like AWS, ensuring pipelines possess the appropriate permissions for their tasks. Secrets are often extremely powerful and are beloved by attackers because they present an opportunity for direct, unabated access to an environment. Maintaining confidentiality of secrets while balancing ease of use by developers is a constant struggle in securing CI/CD pipelines.  Bitbucket Secured Variables: Bitbucket provides a way to store variables so developers can quickly reference them when writing code. Additionally, Bitbucket offers an option to declare a variable as a "secured variable" for any data that is sensitive. A secured variable is designed such that, once its value is set by an administrator, it can no longer be read in plain text. This structure allows developers to make quick calls to secret variables without exposing their values anywhere in Bitbucket. Unless… Exporting Secrets from Bitbucket in Plain Text CI/CD pipelines are designed just like the plumbing in your house. Pipes, valves, and regulators all work in unison to provide you with reliable, running water. CI/CD pipelines are a complicated orchestration of events to accomplish a specific task. In order to accomplish this, these pipelines are highly proficient at packaging and deploying large volumes of data completely autonomously. As a developer, this creates countless possibilities for automating work, but, as a security professional, it can be a cause for anxiety and heartburn. Perhaps it\'s a line of code with a hardcoded secret sneaking into production. Maybe it\'s a developer accidentally storing secrets locally on their machine. Or maybe, as we have seen in recent investigations,  it\'s a Bitbucket artifact object containing secrets for an AWS environment being published to publicly available locations like S3 Buckets or company websites.  Bitbucket secured variables are a convenient way to store secrets locally in Bitbucket for quick reference by developers; however, they come with one concerning characteristic-they can be exposed in plain text through artifact objects. If a Bitbucket variable-secured or not secured-is copied to an artifact object using the artifacts: command, the result will generate a .txt file with]]> 2024-05-21T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/bitbucket-pipeline-leaking-secrets/ www.secnews.physaphae.fr/article.php?IdArticle=8504062 False Tool,Threat,Studies None 3.0000000000000000 Global Security Mag - Site de news francais Le rapport 2024 Voice of the CISO de Proofpoint révèle que plus des trois quarts des RSSI français considèrent l\'erreur humaine comme le risque principal pour la sécurité de l\'entreprise Investigations]]> 2024-05-21T11:33:34+00:00 https://www.globalsecuritymag.fr/le-rapport-2024-voice-of-the-ciso-de-proofpoint-revele-que-plus-des-trois.html www.secnews.physaphae.fr/article.php?IdArticle=8504000 False Studies None 5.0000000000000000 ProofPoint - Cyber Firms 74% des CISO croient que les gens sont leur plus grande vulnérabilité de leur entreprise, révèle la voix de la voix du CISO 2024<br>74% of CISOs Believe that People Are Their Company\\'s Biggest Vulnerability, 2024 Voice of the CISO Report Reveals 2024-05-21T05:00:13+00:00 https://www.proofpoint.com/us/blog/ciso-perspectives/fourth-annual-voice-of-the-ciso-people-risk-concern www.secnews.physaphae.fr/article.php?IdArticle=8503911 False Ransomware,Tool,Vulnerability,Threat,Studies,Cloud None 4.0000000000000000 knowbe4 - cybersecurity services Un nouveau rapport sur les menaces conclut que près de 90% des cybermenaces impliquent l'ingénierie sociale<br>New Threat Report Finds Nearly 90% of Cyber Threats Involve Social Engineering 2024-05-20T18:55:38+00:00 https://blog.knowbe4.com/nearly-90-of-threats-involve-social-engineering www.secnews.physaphae.fr/article.php?IdArticle=8503558 False Threat,Studies None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouveau cyber-recherche XM: 80% des expositions des erreurs de configuration, moins de 1% de CVES<br>New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs A new report from XM Cyber has found – among other insights - a dramatic gap between where most organizations focus their security efforts, and where the most serious threats actually reside. The new report, Navigating the Paths of Risk: The State of Exposure Management in 2024, is based on hundreds of thousands of attack path assessments conducted by the XM Cyber]]> 2024-05-17T16:59:00+00:00 https://thehackernews.com/2024/05/new-xm-cyber-research-80-of-exposures.html www.secnews.physaphae.fr/article.php?IdArticle=8501615 False Studies None 3.0000000000000000 ZD Net - Magazine Info Tous les grains de fournisseur Linux sont-ils insécurisés?Une nouvelle étude dit oui, mais il y a un correctif<br>Are all Linux vendor kernels insecure? A new study says yes, but there\\'s a fix All vendor kernels are plagued with security vulnerabilities, according to a CIQ whitepaper. Will the Linux community ever accept upstream stable kernels?]]> 2024-05-16T20:34:51+00:00 https://www.zdnet.com/article/are-all-linux-vendor-kernels-insecure-a-new-study-says-yes-but-theres-a-fix/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=8503429 False Vulnerability,Studies None 3.0000000000000000 Global Security Mag - Site de news francais Selon Rubrik Zero Labs, 70% de toutes les données sont soumises à des angles morts et ne sont généralement pas lisibles par les dispositifs de sécurité<br>According to Rubrik Zero Labs, 70% of all data is subject to blind spots and is generally not readable by security devices rapports spéciaux
Increasing adoption of the cloud is creating new security blind spots. - Special Reports]]>
2024-05-16T14:45:41+00:00 https://www.globalsecuritymag.fr/according-to-rubrik-zero-labs-70-of-all-data-is-subject-to-blind-spots-and-is.html www.secnews.physaphae.fr/article.php?IdArticle=8501021 False Studies,Cloud None 3.0000000000000000
Global Security Mag - Site de news francais Cyber Threat Research: Poor Patching Practices and Unencrypted Protocols Continue to Haunt Enterprises rapports spéciaux
Cyber Threat Research: Poor Patching Practices and Unencrypted Protocols Continue to Haunt Enterprises Cato Networks unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024. Inaugural Cato Cyber Threat Research Labs (CTRL) Report Analyzes 1.26 Trillion Network Flows to Identify Today\'s Enterprise Security Risks - Special Reports]]>
2024-05-15T15:24:40+00:00 https://www.globalsecuritymag.fr/cyber-threat-research-poor-patching-practices-and-unencrypted-protocols.html www.secnews.physaphae.fr/article.php?IdArticle=8500297 False Threat,Studies,Patching None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine 44% des professionnels de la cybersécurité luttent contre la conformité réglementaire<br>44% of Cybersecurity Professionals Struggle with Regulatory Compliance Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements]]> 2024-05-14T14:20:00+00:00 https://www.infosecurity-magazine.com/news/cyber-pros-struggle-regulatory/ www.secnews.physaphae.fr/article.php?IdArticle=8499608 False Studies None 3.0000000000000000 Global Security Mag - Site de news francais L'étude de consultation FTI révèle des écarts de communication importants entre les CISO<br>FTI Consulting Study Reveals Significant Communications Gaps Between CISOs and C-Suites Despite rapports spéciaux
FTI Consulting Study Reveals Significant Communications Gaps Between CISOs and C-Suites Despite Increased Focus on Cybersecurity Findings Indicate Nearly One-in-Three Executives Believe their CISOs Hesitate to Inform Leadership of Potential Vulnerabilities, Creating Organizational Risk - Special Reports]]>
2024-05-14T13:56:06+00:00 https://www.globalsecuritymag.fr/fti-consulting-study-reveals-significant-communications-gaps-between-cisos-and.html www.secnews.physaphae.fr/article.php?IdArticle=8499569 False Vulnerability,Studies None 3.0000000000000000
Kaspersky - Kaspersky Research blog Rapport d'analyste de la réponse aux incidents 2023<br>Incident response analyst report 2023 The report shares statistics and observations from incident response practice in 2023, analyzes trends and gives cybersecurity recommendations.]]> 2024-05-14T11:00:59+00:00 https://securelist.com/kaspersky-incident-response-report-2023/112504/ www.secnews.physaphae.fr/article.php?IdArticle=8499474 False Studies None 4.0000000000000000 Global Security Mag - Site de news francais ExtraHop® révèle que 91% des organisations ont payé pour des ransomwares en 2023 Investigations]]> 2024-05-14T09:48:08+00:00 https://www.globalsecuritymag.fr/extrahop-r-revele-que-91-des-organisations-ont-paye-pour-des-ransomwares-en.html www.secnews.physaphae.fr/article.php?IdArticle=8499466 False Studies None 3.0000000000000000 Recorded Future - FLux Recorded Future Syndicats d'escroquerie d'Asie du Sud-Est volant 64 milliards de dollars par an, les chercheurs trouvent<br>Southeast Asian scam syndicates stealing $64 billion annually, researchers find 2024-05-13T21:10:08+00:00 https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually www.secnews.physaphae.fr/article.php?IdArticle=8499136 False Studies None 5.0000000000000000 Global Security Mag - Site de news francais Selon Kaspersky, un cyberincident sur trois est dû à un ransomware Malwares]]> 2024-05-13T12:31:54+00:00 https://www.globalsecuritymag.fr/selon-kaspersky-un-cyberincident-sur-trois-est-du-a-un-ransomware.html www.secnews.physaphae.fr/article.php?IdArticle=8499373 False Ransomware,Studies None 3.0000000000000000 Global Security Mag - Site de news francais 97 % des entreprises touchées par une demande de rançon déclarent avoir collaboré avec les forces de l\'ordre, selon le rapport état des ransomwares 2024 de Sophos Malwares]]> 2024-05-13T12:26:09+00:00 https://www.globalsecuritymag.fr/97-des-entreprises-touchees-par-une-demande-de-rancon-declarent-avoir-collabore.html www.secnews.physaphae.fr/article.php?IdArticle=8499374 False Studies None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Sagesse sauvage: ce que la technologie apprend du monde naturel<br>Wild Wisdom: What Technology Learns from the Natural World biomimetics. Nature’s inspiration for innovation in Spacesuits and Cyber Defense Not only is nature beautiful to look at, but it is also providing us with fantastic ideas for solving complex technological problems. The concept of biomimicry, which refers to drawing inspiration from natural systems to address human challenges, is now trending heavily in fields such as cybersecurity and space exploration. Biomimicry involves the creation and development of materials, structures, and systems that are inspired by biological entities and processes. For thousands of years, humans have turned to the natural world as a source of inspiration for innovations across various domains, including transportation and entertainment. This approach has led to significant advancements, such as the design of aircraft inspired by the aerodynamics of bird wings and the development of anti-glare screens modeled after the intricate nanostructures found in moth eyes. By observing and emulating the unique characteristics of wildlife, we have continuously found ways to enhance our technological capabilities and improve the quality of our daily lives. This field not only highlights the ingenuity inherent in nature but also underscores the potential for sustainable and efficient design solutions drawn from the biological world Nature’s Influence on Cybersecurity Data Masking Inspired by Moths The humble moth, with its ability to blend into its surroundings, provides a perfect metaphor for data masking in cybersecurity. This technique involves hiding real data among fake data, thereby protecting sensitive information from prying eyes. Steganography and the Chameleon Similarly, the chameleon\'s ability to change its color to match its environment mirrors the practice of steganography in cybersecurity. This method involves hiding information within non-secret data, much like concealing a secret message within an ordinary-looking image or audio file. Digital watermarking in multimedia is a practical application of this technique, helping to secure copyrights by embedding invisible codes within files. Consider some applications in different industry verticals: Sacrificial systems and deception Inspired by how some animals like lizards can shed their tails to protect vital organs, healthcare cybersecurity could utilize "sacrificial systems" - offering up less critical systems or data as decoys to distract and study cyber attackers, buying time to strengthen protection of the most sensitive medical information. Biomimicry in Space Suits: A Journey from Earth to Beyond Radiation Protection Inspired by Fungi Recent studies have explored the potential of fungi, particularly those thriving in the radioactive wasteland of Chernobyl, to protect astronauts from cosmic rays. These fungi utilize radiation as an energy source, suggesting their potential to develop into living, self-repairing shie]]> 2024-05-10T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/wild-wisdom-what-technology-learns-from-the-natural-world www.secnews.physaphae.fr/article.php?IdArticle=8497111 False Studies,Medical None 3.0000000000000000 Dark Reading - Informationweek Branch 87% des attaques DDOS ciblées dispositifs de système d'exploitation ciblé en 2023<br>87% of DDoS Attacks Targeted Windows OS Devices in 2023 2024-05-09T20:21:41+00:00 https://www.darkreading.com/cyberattacks-data-breaches/87-of-ddos-attacks-targeted-windows-os-devices-in-2023 www.secnews.physaphae.fr/article.php?IdArticle=8496786 False Studies None 4.0000000000000000 Zimperium - cyber risk firms for mobile Pourquoi la protection des appareils du personnel du secteur public est essentiel<br>Why Protecting Public Sector Personnel\\'s Devices is Essential The recent hack of Senator Lindsey Graham\'s phone offers a critical case study, revealing how smishing attacks can successfully compromise personal devices with alarming consequences. ]]> 2024-05-08T23:16:03+00:00 https://www.zimperium.com/blog/white-box-cryptography-the-key-to-safeguarding-sensitive-data-in-mobile-applications/ www.secnews.physaphae.fr/article.php?IdArticle=8496234 False Hack,Studies None 3.0000000000000000 Global Security Mag - Site de news francais 97% des organisations frappées par des ransomwares ont travaillé avec les forces de l'ordre, le rapport Sophos State of Ransomware est constaté<br>97% of Organizations Hit by Ransomware Worked with Law Enforcement, Sophos State of Ransomware Report Finds rapports spéciaux
97% of Organizations Hit by Ransomware Worked with Law Enforcement, Sophos State of Ransomware Report Finds by Sophos - Special Reports]]>
2024-05-08T08:19:06+00:00 https://www.globalsecuritymag.fr/97-of-organizations-hit-by-ransomware-worked-with-law-enforcement-sophos-state.html www.secnews.physaphae.fr/article.php?IdArticle=8495804 False Ransomware,Studies,Legislation None 4.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouvelle étude de cas: le commentaire malveillant<br>New Case Study: The Malicious Comment How safe is your comments section? Discover how a seemingly innocent \'thank you\' comment on a product page concealed a malicious vulnerability, underscoring the necessity of robust security measures. Read the full real-life case study here.  When is a \'Thank you\' not a \'Thank you\'? When it\'s a sneaky bit of code that\'s been hidden inside a \'Thank You\']]> 2024-05-07T16:12:00+00:00 https://thehackernews.com/2024/05/new-case-study-malicious-comment.html www.secnews.physaphae.fr/article.php?IdArticle=8495186 False Vulnerability,Studies None 3.0000000000000000 TechRepublic - Security News US Top 5 des tendances mondiales de la cybersécurité de 2023, selon Google Report<br>Top 5 Global Cyber Security Trends of 2023, According to Google Report According to the M-Trends report, the average time it takes for an organisation to detect an attacker in their environment has decreased from 16 days in 2022 to 10 days in 2023.]]> 2024-05-03T16:52:14+00:00 https://www.techrepublic.com/article/cyber-security-trends-google-report/ www.secnews.physaphae.fr/article.php?IdArticle=8493104 False Studies None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Applications Android Flaw affectées avec 4 milliards d'installations<br>Android Flaw Affected Apps With 4 Billion Installs Microsoft illustrated the severity of the issue via a case study involving Xiaomi\'s File Manager]]> 2024-05-02T15:30:00+00:00 https://www.infosecurity-magazine.com/news/android-flaw-apps-4-billion/ www.secnews.physaphae.fr/article.php?IdArticle=8492471 False Studies,Mobile None 2.0000000000000000 Global Security Mag - Site de news francais Le rapport État de la cybersécurité en 2024 de Splunk met en avant l\'impact grandissant de l\'IA générative dans le paysage de la cybersécurité Investigations]]> 2024-05-02T07:49:28+00:00 https://www.globalsecuritymag.fr/le-rapport-etat-de-la-cybersecurite-en-2024-de-splunk-met-en-avant-l-impact.html www.secnews.physaphae.fr/article.php?IdArticle=8492255 False Studies None 4.0000000000000000 Global Security Mag - Site de news francais 2024 Rapport d'investigations sur les violations de données: La moitié des violations en EMEA sont internes<br>2024 Data Breach Investigations Report: Half of the breaches in EMEA are internal rapports spéciaux
2024 Data Breach Investigations Report: Half of the breaches in EMEA are internal What you need to know: • More than two-thirds (68%) of breaches globally involve a non-malicious human action. • Vulnerability exploitation experienced 180% growth vs 2023. • On average it took organisations about 55 days to patch 50% of their critical vulnerabilities. - Special Reports]]>
2024-05-02T07:44:47+00:00 https://www.globalsecuritymag.fr/2024-data-breach-investigations-report-half-of-the-breaches-in-emea-are.html www.secnews.physaphae.fr/article.php?IdArticle=8492256 False Data Breach,Vulnerability,Studies None 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Attaque "Stream Dirty": découvrir et atténuer un modèle de vulnérabilité commun dans les applications Android<br>“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps 2024-05-01T19:46:49+00:00 https://community.riskiq.com/article/ddb0878a www.secnews.physaphae.fr/article.php?IdArticle=8492016 False Tool,Vulnerability,Threat,Studies,Mobile,Technical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Ransom Payments augmente de 500% à une moyenne de 2 millions de dollars<br>Ransom Payments Surge by 500% to an Average of $2m Sophos found that the average ransom payment was $2m in 2023, with 63% of ransom demands $1m or more]]> 2024-04-30T11:40:00+00:00 https://www.infosecurity-magazine.com/news/ransom-payments-surge-500/ www.secnews.physaphae.fr/article.php?IdArticle=8491220 False Studies None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'étude révèle des niveaux alarmants du trafic de phishing USPS<br>Study Reveals Alarming Levels of USPS Phishing Traffic The top malicious domains attracted over 100,000 hits each, according to Akamai Security]]> 2024-04-29T16:00:00+00:00 https://www.infosecurity-magazine.com/news/study-reveals-usps-phishing-levels/ www.secnews.physaphae.fr/article.php?IdArticle=8490730 False Studies None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant De l'assistant à l'analyste: la puissance de Gemini 1.5 Pro pour l'analyse des logiciels malveillants<br>From Assistant to Analyst: The Power of Gemini 1.5 Pro for Malware Analysis Gemini 1.5 Pro to the test to see how it performed at analyzing malware. By providing code and using a simple prompt, we asked Gemini 1.5 Pro to determine if the file was malicious, and also to provide a list of activities and indicators of compromise. We did this for multiple malware files, testing with both decompiled and disassembled code, and Gemini 1.5 Pro was notably accurate each time, generating summary reports in human-readable language. Gemini 1.5 Pro was even able to make an accurate determination of code that - at the time - was receiving zero detections on VirusTotal.  In our testing with other similar gen AI tools, we were required to divide the code into chunks, which led to vague and non-specific outcomes, and affected the overall analysis. Gemini 1.5 Pro, however, processed the entire code in a single pass, and often in about 30 to 40 seconds. Introduction The explosive growth of malware continues to challenge traditional, manual analysis methods, underscoring the urgent need for improved automation and innovative approaches. Generative AI models have become invaluable in some aspects of malware analysis, yet their effectiveness in handling large and complex malware samples has been limited. The introduction of Gemini 1.5 Pro, capable of processing up to 1 million tokens, marks a significant breakthrough. This advancement not only empowers AI to function as a powerful assistant in automating the malware analysis workflow but also significantly scales up the automation of code analysis. By substantially increasing the processing capacity, Gemini 1.5 Pro paves the way for a more adaptive and robust approach to cybersecurity, helping analysts manage the asymmetric volume of threats more effectively and efficiently. Traditional Techniques for Automated Malware Analysis The foundation of automated malware analysis is built on a combination of static and dynamic analysis techniques, both of which play crucial roles in dissecting and understanding malware behavior. Static analysis involves examining the malware without executing it, providing insights into its code structure and unobfuscated logic. Dynamic analysis, on the other hand, involves observing the execution of the malware in a controlled environment to monitor its behavior, regardless of obfuscation. Together, these techniques are leveraged to gain a comprehensive understanding of malware. Parallel to these techniques, AI and machine learning (ML) have increasingly been employed to classify and cluster malware based on behavioral patterns, signatures, and anomalies. These methodologies have ranged from supervised learning, where models are trained on labeled datasets, to unsupervised learning for clustering, which identifies patterns without predefined labels to group similar malware.]]> 2024-04-29T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/gemini-for-malware-analysis/ www.secnews.physaphae.fr/article.php?IdArticle=8500392 False Malware,Hack,Tool,Vulnerability,Threat,Studies,Prediction,Cloud,Conference Wannacry 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial À travers l'objectif d'une étude de cas: ce qu'il faut pour être un analyste des risques cyber-physiques<br>Through the Lens of a Case Study: What It Takes to Be a Cyber-Physical Risk Analyst Je couvre régulièrement le sujet de l'analyse des risques cyber-physiques dans mes écrits, et en conséquence, j'ai reçu ...
>I regularly cover the topic of cyber-physical risk analysis in my writings, and as a result, I’ve received... ]]>
2024-04-28T05:22:29+00:00 https://industrialcyber.co/expert/through-the-lens-of-a-case-study-what-it-takes-to-be-a-cyber-physical-risk-analyst/ www.secnews.physaphae.fr/article.php?IdArticle=8489936 False Studies None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine 11% des équipes de cybersécurité n'ont aucune femme<br>11% of Cybersecurity Teams Have Zero Women A new ISC2 study highlights the lack of diversity in cybersecurity with only 4% of teams having a majority of women, while 11% have none at all]]> 2024-04-25T10:05:00+00:00 https://www.infosecurity-magazine.com/news/11-percent-cybersecurity-teams/ www.secnews.physaphae.fr/article.php?IdArticle=8488460 False Studies None 3.0000000000000000 SecurityWeek - Security News Nouvelle analyse de craquage de mot de passe cible bcrypt<br>New Password Cracking Analysis Targets Bcrypt Les systèmes Hive mènent une autre étude sur les mots de passe de fissuration via des attaques de force brute, mais il ne cible plus MD5.
>Hive Systems conducts another study on cracking passwords via brute-force attacks, but it\'s no longer targeting MD5. ]]>
2024-04-24T10:22:19+00:00 https://www.securityweek.com/new-password-cracking-analysis-targets-bcrypt/ www.secnews.physaphae.fr/article.php?IdArticle=8487923 False Studies None 3.0000000000000000
AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Comprendre comment la rationalité, la théorie de la dissuasion et l'indéterminisme influencent la cybercriminalité.<br>Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime. 2024-04-24T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/understanding-how-rationality-deterrence-theory-and-indeterminism-influence-cybercrime www.secnews.physaphae.fr/article.php?IdArticle=8488070 False Tool,Vulnerability,Studies,Legislation,Prediction None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le cinquième des Cisos admettent que le personnel a divulgué des données via Genai<br>Fifth of CISOs Admit Staff Leaked Data Via GenAI One in five UK organizations have had corporate data exposed via generative AI, says RiverSafe]]> 2024-04-24T09:15:00+00:00 https://www.infosecurity-magazine.com/news/fifth-cisos-staff-leaked-data-genai/ www.secnews.physaphae.fr/article.php?IdArticle=8487896 False Studies None 4.0000000000000000 Fortinet - Fabricant Materiel Securite Résultats clés du rapport de sécurité du cloud 2024<br>Key Findings from the 2024 Cloud Security Report Learn how organizations are using the cloud, their cloud-security challenges, and other insights from the 2024 Cloud Security Report]]> 2024-04-23T19:38:00+00:00 https://www.fortinet.com/blog/industry-trends/key-findings-cloud-security-report-2024 www.secnews.physaphae.fr/article.php?IdArticle=8487424 False Studies,Cloud None 3.0000000000000000 IT Security Guru - Blog Sécurité Informations expertes: les méthodes de recrutement obsolètes entravent la cyber armée mondiale<br>Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army Insight expert: les méthodes de recrutement obsolètes entravent la cyber-armée mondiale Apparu pour la première fois sur gourou de la sécurité informatique .
Cybersecurity is \'inclusive\' by nature: no one is exempt from the fallout of the expanding cyber threat landscape. The notion, therefore, that some groups of individuals are offered fewer opportunities to join the cyber industry than others is frankly absurd. ISC2\'s latest Cybersecurity Workforce Study gives us a snapshot into the supply and demand of […] The post Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army first appeared on IT Security Guru. ]]>
2024-04-23T15:09:25+00:00 https://www.itsecurityguru.org/2024/04/23/expert-insight-outdated-recruitment-methods-are-impeding-the-global-cyber-army/?utm_source=rss&utm_medium=rss&utm_campaign=expert-insight-outdated-recruitment-methods-are-impeding-the-global-cyber-army www.secnews.physaphae.fr/article.php?IdArticle=8487483 False Threat,Studies None 3.0000000000000000
Data Security Breach - Site de news Francais La menace croissante des bots malveillants : rapport Imperva Bad Bot 2024 2024-04-22T22:02:33+00:00 https://www.datasecuritybreach.fr/bot-internet/ www.secnews.physaphae.fr/article.php?IdArticle=8487052 False Studies None 3.0000000000000000 Techworm - News FBI: Akira Ransomware Group a fait 42 millions de dollars sur plus de 250 orgs<br>FBI: Akira Ransomware Group Made $42 Million From 250+ Orgs #StopRansomare: Review our ? #cybersecurity advisory, outlining known #AkiraRansomware #TTPs & #IOCs, developed with @FBI, @EC3Europol, & @NCSC_NL to reduce the exploitation of businesses and critical infrastructure. https://t.co/2VBMKhoAXK pic.twitter.com/Nn0fEK4HRw — CISA Cyber (@CISACyber) April 18, 2024 “Early versions of the Akira ransomware variant were written in C++ and encrypted files with a .akira extension; however, beginning in August 2023, some Akira attacks began deploying Megazord, using Rust-based code which encrypts files with a .powerranges extension.  Akira threat actors have continued to use both Megazord and Akira, including Akira_v2 (identified by trusted third party investigations) interchangeably,” the joint cybersecurity advisory reads. The FBI and cybersecurity researchers have observed Akira threat actors obtaining initial access to organizations through a virtual private network (VPN) service without multifactor authentication (MFA) configured, mostly using known Cisco vulnerabilities CVE-2020-3259 and CVE-2023-20269. Additional methods of initial access include the use of external-facing services such as Remote Desktop Protocol (RDP), spear phishing attacks, and credential abuse. Once initial access is obtained, Akira threat actors attempt to exploit the functions of domain controllers by creating new domain accounts to establish persis]]> 2024-04-19T20:15:33+00:00 https://www.techworm.net/2024/04/akira-ransomware-42-million-250-orgs.html www.secnews.physaphae.fr/article.php?IdArticle=8485347 False Ransomware,Vulnerability,Threat,Studies None 3.0000000000000000 TechRepublic - Security News US Étude de Kaspersky: les appareils infectés par des logiciels malveillants de vol de données ont augmenté de 7 fois depuis 2020<br>Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020 Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device.]]> 2024-04-18T16:26:44+00:00 https://www.techrepublic.com/article/data-stealing-malware-study/ www.secnews.physaphae.fr/article.php?IdArticle=8484857 False Malware,Studies None 3.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 2024 Rapport de sécurité: édition de podcast<br>2024 Security Report: Podcast Edition Une fois par an, Check Point publie un rapport annuel examinant les plus grands événements et tendances de la cybersécurité.Dans cet épisode, nous décomposons la dernière itération, en nous concentrant sur ses parties les plus importantes, pour vous rattraper ce que vous devez savoir en 2024.
>Once every year, Check Point releases an annual report reviewing the biggest events and trends in cybersecurity. In this episode we’ll break down the latest iteration, focusing on its most important parts, to catch you up on what you need to know most in 2024. ]]>
2024-04-18T13:00:09+00:00 https://research.checkpoint.com/2024/2024-security-report-podcast-edition/ www.secnews.physaphae.fr/article.php?IdArticle=8484727 False Studies None 4.0000000000000000
ProjectZero - Blog de recherche Google The Windows Registry Adventure # 1: Résultats d'introduction et de recherche<br>The Windows Registry Adventure #1: Introduction and research results Bochspwn, Bochspwn Reloaded, and my earlier font fuzzing infrastructure), and needed some binary formats to test it on. My first pick were PE files: they are very popular in the Windows environment, which makes it easy to create an initial corpus of input samples, and a basic fuzzing harness is equally easy to develop with just a single GetFileVersionInfoSizeW API call. The test was successful: even though I had previously fuzzed PE files in 2019, the new element of code coverage guidance allowed me to discover a completely new bug: issue #2281. For my next target, I chose the Windows registry. That\'s because arbitrary registry hives can be loaded from disk without any special privileges via the RegLoadAppKey API (since Windows Vista). The hives use a binary format and are fully parsed in the kernel, making them a noteworthy local attack surface. Furthermore, I was also somewhat familiar with basic harnessing of the registry, having fuzzed it in 2016 together with James Forshaw. Once again, the code coverage support proved useful, leading to the discovery of issue #2299. But when I started to perform a root cause analysis of the bug, I realized that: The hive binary format is not very well suited for trivial bitflipping-style fuzzing, because it is structurally simple, and random mutations are much more likely to render (parts of) the hive unusable than to trigger any interesting memory safety violations.On the other hand, the registry has many properties that make it an attractive attack]]> 2024-04-18T09:53:59+00:00 https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html www.secnews.physaphae.fr/article.php?IdArticle=8484833 False Tool,Vulnerability,Threat,Studies None 4.0000000000000000 ProofPoint - Cyber Firms Réduire le désabonnement d'incitation avec une composition de modèle explosive<br>Reducing Prompting Churn with Exploding Template Composition 2024-04-17T18:00:31+00:00 https://www.proofpoint.com/us/blog/engineering-insights/exploding-prompts-available-open-source www.secnews.physaphae.fr/article.php?IdArticle=8484113 False Malware,Tool,Threat,Studies,Cloud,Technical None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les menaces d'initié augmentent 14% par an en tant que piqûres de crise du coût de la vie<br>Insider Threats Surge 14% Annually as Cost-of-Living Crisis Bites Cifas reveals 14% rise in dishonest employees, driven mainly by financial necessity last year]]> 2024-04-17T08:30:00+00:00 https://www.infosecurity-magazine.com/news/insider-threats-14-cost-living/ www.secnews.physaphae.fr/article.php?IdArticle=8483988 False Studies None 3.0000000000000000 Global Security Mag - Site de news francais Tendances mondiales de la cybersécurité au 1er trimestre 2024 : les cyberattaques en hausse de 28 % dans le monde Malwares]]> 2024-04-17T08:21:29+00:00 https://www.globalsecuritymag.fr/tendances-mondiales-de-la-cybersecurite-au-1er-trimestre-2024-les-cyberattaques.html www.secnews.physaphae.fr/article.php?IdArticle=8483992 False Ransomware,Studies None 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Facteur humain de la cybersécurité: fusion de la technologie avec des stratégies centrées sur les personnes<br>Cybersecurity\\'s Human Factor: Merging Tech with People-Centric Strategies nuanced approach to cybersecurity—one that not only fortifies defenses but also resonates with and supports the people behind the screens. Integrating human-centric design with continuous threat management emerges as a forward-thinking strategy, promising a balanced blend of technical excellence and user empathy to navigate the complex cybersecurity challenges of today and tomorrow. Embracing the Human Element in Cybersecurity Diving into the realm of human-centric security design and culture, it\'s clear that the future of cybersecurity isn\'t just about the latest technology—it\'s equally about the human touch. This approach puts the spotlight firmly on enhancing the employee experience, ensuring that cybersecurity measures don\'t become an unbearable burden that drives people to take shortcuts. By designing systems that people can use easily and effectively, the friction often caused by stringent security protocols can be significantly reduced. Gartner\'s insights throw a compelling light on this shift, predicting that by 2027, half of all Chief Information Security Officers (CISOs) will have formally embraced human-centric security practices. This isn\'t just a hopeful guess but a recognition of the tangible benefits these practices bring to the table—reducing operational friction and bolstering the adoption of essential controls. This strategic pivot also acknowledges a fundamental truth. When security becomes a seamless part of the workflow, its effectiveness skyrockets. It\'s a win-win, improving both the user experience and the overall security posture. CTEM: Your Cybersecurity Compass in Stormy Seas Imagine that your organization\'s cybersecurity landscape isn\'t just a static battleground. Instead, it’s more like the open sea, with waves of threats coming and going, each with the potential to breach your defenses. That\'s where Continuous Threat Exposure Management (CTEM) sails in, serving as your trusted compass, guiding you through these treacherous waters. CTEM isn\'t your average, run-of-the-mill security tactic. It\'s about being proactive, scanning the horizon with a spyglass, looking for potential vulnerabilities before they even become a blip on a hacker\'s radar. Think of it as your cybersecurity early-warning system, constantly on the lookout for trou]]> 2024-04-16T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/cybersecuritys-human-factor-merging-tech-with-people-centric-strategies www.secnews.physaphae.fr/article.php?IdArticle=8483336 False Vulnerability,Threat,Studies,Prediction,Medical,Technical None 2.0000000000000000 TechRepublic - Security News US Étude Sophos: 94% des victimes de ransomwares ont leurs sauvegardes ciblées par les attaquants<br>Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers Research has found that criminals can demand higher ransom when they compromise an organisation\'s backup data in a ransomware attack. Discover advice from security experts on how to properly protect your backup.]]> 2024-04-12T15:44:26+00:00 https://www.techrepublic.com/article/ransomware-attackers-target-backups/ www.secnews.physaphae.fr/article.php?IdArticle=8480811 False Ransomware,Studies None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Les femmes font moins que des hommes dans les cyber-emplois américains - mais l'écart se rétrécit<br>Women make less than men in US cyber jobs - but the gap is narrowing Une étude de l'ISC2 à but non lucratif révèle que les champs de cybersécurité sont des tendances américaines des disparités de rémunération entre les hommes et les femmes.
>A study from non-profit ISC2 finds that the cybersecurity fields bucks U.S. trends of pay disparities between men and women. ]]>
2024-04-11T13:00:00+00:00 https://cyberscoop.com/women-make-less-than-men-in-us-cyber-jobs-but-the-gap-is-narrowing/ www.secnews.physaphae.fr/article.php?IdArticle=8479992 False Studies None 3.0000000000000000
Recorded Future - FLux Recorded Future La FCC ouvre une réglementation à la sonde de la voiture connectée<br>FCC opens rulemaking to probe connected car stalking La Federal Communications Commission (FCC) a annoncé lundi qu'elle lançait une procédure officielle pour étudier les moyens d'empêcher les agresseurs d'utiliser des outils de connectivité automobile pour harceler les survivants de la violence domestique.L'agence a déclaré avoir publié un avis de réglementation proposée qui abritera comment s'assurer que les constructeurs automobiles et les services sans fil
The Federal Communications Commission (FCC) announced Monday that it is launching a formal proceeding to study ways to prevent abusers from using car connectivity tools to harass domestic violence survivors. The agency said it has issued a notice of proposed rulemaking which will home in on how to make sure automakers and wireless service]]>
2024-04-09T00:37:43+00:00 https://therecord.media/fcc-connected-car-stalking-rulemaking www.secnews.physaphae.fr/article.php?IdArticle=8478392 False Tool,Studies None 2.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Même cibles, nouveaux manuels: les acteurs de la menace en Asie de l'Est utilisent des méthodes uniques<br>Same targets, new playbooks: East Asia threat actors employ unique methods 2024-04-05T13:39:39+00:00 https://community.riskiq.com/article/b4f39b04 www.secnews.physaphae.fr/article.php?IdArticle=8476526 False Malware,Tool,Vulnerability,Threat,Studies,Industrial,Prediction,Technical Guam 3.0000000000000000 Global Security Mag - Site de news francais CheckMarx One Total Economic Impact Study révèle un retour sur investissement de 177% dans moins de six mois et un gain de 7,13 millions de dollars en avantages sociaux sur trois ans<br>Checkmarx One Total Economic Impact Study Finds Return on Investment of 177% in Fewer Than Six Months and Gain of $7.13M in Benefits Over Three Years rapports spéciaux
Checkmarx One Total Economic Impact Study Finds Return on Investment of 177% in Fewer Than Six Months and Gain of $7.13M in Benefits Over Three Years New independent study of a global, $10 billion composite organization with 1000 developers demonstrated a 177% ROI, 40-50% improvement in developer productivity and 35% reduction in the likelihood of a breach over three years - Special Reports]]>
2024-04-05T12:24:03+00:00 https://www.globalsecuritymag.fr/checkmarx-one-total-economic-impact-study-finds-return-on-investment-of-177-in.html www.secnews.physaphae.fr/article.php?IdArticle=8476479 False Studies None 2.0000000000000000
Mandiant - Blog Sécu de Mandiant Cutting avant, partie 4: Ivanti Connect Secure VPN Post-Exploitation Mouvement latéral Études de cas<br>Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies   Since the initial disclosure of CVE-2023-46805 and CVE-2024-21887 on Jan. 10, 2024, Mandiant has conducted multiple incident response engagements across a range of industry verticals and geographic regions. Mandiant\'s previous blog post, Cutting Edge, Part 3: Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts, details zero-day exploitation of CVE-2024-21893 and CVE-2024-21887 by a suspected China-nexus espionage actor that Mandiant tracks as UNC5325.  This blog post, as well as our previous reports detailing Ivanti exploitation, help to underscore the different types of activity that Mandiant has observed on vulnerable Ivanti Connect Secure appliances that were unpatched or did not have the appropriate mitigation applied.  Mandiant has observed different types of post-exploitation activity across our incident response engagements, including lateral movement supported by the deployment of open-source tooling and custom malware families. In addition, we\'ve seen these suspected China-nexus actors evolve their understanding of Ivanti Connect Secure by abusing appliance-specific functionality to achieve their objectives. As of April 3, 2024, a patch is readily available for every supported version of Ivanti Connect Secure affected by the vulnerabilities. We recommend that customers follow Ivanti\'s latest patching guidance and instructions to prevent further exploitation activity. In addition, Ivanti released a new enhanced external integrity checker tool (ICT) to detect potential attempts of malware persistence across factory resets and system upgrades and other tactics, techniques, and procedures (TTPs) observed in the wild. We also released a remediation and hardening guide]]> 2024-04-04T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/ivanti-post-exploitation-lateral-movement/ www.secnews.physaphae.fr/article.php?IdArticle=8500398 False Malware,Tool,Vulnerability,Threat,Studies,Mobile,Cloud Guam 3.0000000000000000 Global Security Mag - Site de news francais Plus de la moitié des utilisateurs de smartphones britanniques sont devenus vulnérables aux cyberattaques<br>Over Half of UK Smartphone Users Left Vulnerable to Cyber Attacks rapports spéciaux / /
Over Half of UK Smartphone Users Left Vulnerable to Cyber Attacks by Bitdefende has uncovered a stark reality: more than half of smartphone users are gambling with their digital safety. - Special Reports / ]]>
2024-04-04T08:46:30+00:00 https://www.globalsecuritymag.fr/over-half-of-uk-smartphone-users-left-vulnerable-to-cyber-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=8475755 False Studies None 3.0000000000000000
knowbe4 - cybersecurity services Le nouveau rapport montre que les liens de phishing et les attachements malveillants sont les principaux points d'entrée des cyberattaques<br>New Report Shows Phishing Links and Malicious Attachments Are The Top Entry Points of Cyber Attacks phishing et les utilisateurs Liste en tant que CyberAttack Initial Access Activers Les nouvelles données d'attaque TTP couvrant 2023 mettent en lumière les acteurs de la menace et les actions des utilisateurs qui mettent les organisations les plus à risque.
Phishing and Users Top List as Cyberattack Initial Access Enablers New TTP attack data covering 2023 sheds much needed light on the threat actor and user actions that are putting organizations at the most risk.]]>
2024-04-03T16:36:17+00:00 https://blog.knowbe4.com/phishing-and-users-top-list-as-cyberattack-initial-access-enablers www.secnews.physaphae.fr/article.php?IdArticle=8475328 False Threat,Studies None 3.0000000000000000
ComputerWeekly - Computer Magazine Le RDP a abusé de plus de 90% des cyberattaques, Sophos trouve<br>RDP abused in over 90% of cyber attacks, Sophos finds 2024-04-03T15:51:00+00:00 https://www.computerweekly.com/news/366578657/RDP-abused-in-over-90-of-cyber-attacks-Sophos-finds www.secnews.physaphae.fr/article.php?IdArticle=8475417 False Studies None 4.0000000000000000 Mandiant - Blog Sécu de Mandiant La vie après la mort?Les campagnes de l'IO liées à un homme d'affaires russe notoire Prigozhin persiste après sa chute politique et sa mort<br>Life After Death? IO Campaigns Linked to Notorious Russian Businessman Prigozhin Persist After His Political Downfall and Death   In June 2023, Russian businessman Yevgeniy Prigozhin and his private military company (PMC) “Wagner” carried out an armed mutiny within Russia. The events triggered the meteoric political downfall of Prigozhin, raising questions about the future of his various enterprises that were only underscored when he died two months later under suspicious circumstances. Up to that point, Prigozhin and his enterprises worked to advance the Kremlin\'s interests as the manifestation of the thinnest veil of plausible deniability for state-guided actions on multiple continents. Such enterprises included the Wagner PMC; overt influence infrastructure, like his media company Patriot Group that housed his media companies, including the “RIA FAN” Federal News Agency; covert influence infrastructures; and an array of businesses aimed at generating personal wealth and the resourcing necessary to fund his various ventures. Mandiant has for years tracked and reported on covert information operations (IO) threat activity linked to Prigozhin. His involvement in IO was first widely established in the West as part of the public exposure of Russian-backed interference in the 2016 U.S. presidential election-this included activity conducted by Russia\'s Internet Research Agency (IRA), which the U.S. Government publicly named Prigozhin as its financier. Subsequently, Prigozhin was publicly connected to a web of IO activity targeting the U.S., EU, Ukraine, Russian domestic audiences, countries across Africa, and further afield. Such activity has worked not only to advance Russian interests on matters of strategic importance, but also has attempted to exploit existing divisions in societies targeting various subgroups across their population.  Throughout 2023, Mandiant has observed shifts in the activity from multiple IO campaigns linked to Prigozhin, including continued indicators that components of these campaigns have remained viable since his death. This blog post examines a sample of Prigozhin-linked IO campaigns to better understand their outcomes thus far and provide an overview of what can be expected from these activity sets in the future. This is relevant not only because some of the infrastructure of these campaigns remains viable despite Prigozhin\'s undoing, but also because we advance into a year in which Ukraine continues to dominate Russia\'s strategic priorities and there are multiple global elections that Russia may seek to influence. Mandiant and Google\'s Threat Analysis Group (TAG) work together in support of our respective missions at Google. TAG has likewise been tracking coordinated influence operations linked to Prigozhin and the Internet Research Agency (IRA) for years; and in 2023, Google took over 400 enforcement actions to disrupt IO campaigns linked to the IRA, details of which are reported in the quarterly TAG Bulletin. TAG has not observed significant activity from the IRA or other Prigozhin-linked entities specifically on Google platforms since Prigozhin\'s death,]]> 2024-03-28T11:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/io-campaigns-russian-prigozhin-persist/ www.secnews.physaphae.fr/article.php?IdArticle=8500400 False Threat,Studies,Legislation,Prediction None 3.0000000000000000 Global Security Mag - Site de news francais Flashpoint libère le rapport annuel de renseignement sur les menaces mondiales<br>Flashpoint Releases Annual Global Threat Intelligence Report - rapports spéciaux
Flashpoint released its 2024 Global Threat Intelligence Report that looks back at 2023 to shed light on cyber threats, geopolitical turmoil, and escalating physical conflicts around the world to help organizations strengthen defenses, ensure operational resilience, and proactively confront multifaceted threats. - Special Reports]]>
2024-03-27T20:00:58+00:00 https://www.globalsecuritymag.fr/flashpoint-releases-annual-global-threat-intelligence-report.html www.secnews.physaphae.fr/article.php?IdArticle=8471580 False Threat,Studies None 4.0000000000000000
Global Security Mag - Site de news francais L'IA et l'automatisation ont aidé les organisations à répondre aux incidents de sécurité jusqu'à 99% plus rapidement que l'année dernière, selon une nouvelle étude de Reliaquest<br>AI and automation have helped organizations respond to security incidents up to 99% faster than last year, according to new study from ReliaQuest rapports spéciaux
AI and automation have helped organizations respond to security incidents up to 99% faster than last year, according to new study from ReliaQuest With social engineering still the biggest threat to organizations, AI is being leveraged on both sides to increase the threat and the speed of defense; Organizations fully leveraging AI and automation can respond to threats within 7 minutes or less - Special Reports]]>
2024-03-26T17:21:58+00:00 https://www.globalsecuritymag.fr/ai-and-automation-have-helped-organizations-respond-to-security-incidents-up-to.html www.secnews.physaphae.fr/article.php?IdArticle=8470888 False Threat,Studies None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial L'étude FDD révèle des lacunes dans le recrutement et la rétention des cyber-talents de l'armée américaine, appelle des réformes<br>FDD study reveals gaps in US military\\'s cyber talent recruitment and retention, calls for reforms The Foundation for Defense of Democracies (FDD) published a study highlighting a mismatch in the U.S. military\'s failure... ]]> 2024-03-26T15:12:18+00:00 https://industrialcyber.co/threat-landscape/fdd-study-reveals-gaps-in-us-militarys-cyber-talent-recruitment-and-retention-calls-for-reforms/ www.secnews.physaphae.fr/article.php?IdArticle=8470828 False Studies None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Google paie 10 millions de dollars en primes de bogue en 2023<br>Google Pays $10M in Bug Bounties in 2023 Détails .Il est de 2 millions de dollars de moins qu'en 2022, mais il est encore beaucoup beaucoup. La récompense la plus élevée pour un rapport de vulnérabilité en 2023 était de 113 337 $, tandis que le décompte total depuis le lancement du programme en 2010 a atteint 59 millions de dollars. Pour Android, le système d'exploitation mobile le plus populaire et le plus largement utilisé, le programme a accordé plus de 3,4 millions de dollars. Google a également augmenté le montant maximal de récompense pour les vulnérabilités critiques concernant Android à 15 000 $, ce qui a augmenté les rapports communautaires. Au cours des conférences de sécurité comme ESCAL8 et Hardwea.io, Google a attribué 70 000 $ pour 20 découvertes critiques dans le système d'exploitation Android et Android Automotive et 116 000 $ pour 50 rapports concernant les problèmes dans Nest, Fitbit et Wearables ...
BleepingComputer has the details. It’s $2M less than in 2022, but it’s still a lot. The highest reward for a vulnerability report in 2023 was $113,337, while the total tally since the program’s launch in 2010 has reached $59 million. For Android, the world’s most popular and widely used mobile operating system, the program awarded over $3.4 million. Google also increased the maximum reward amount for critical vulnerabilities concerning Android to $15,000, driving increased community reports. During security conferences like ESCAL8 and hardwea.io, Google awarded $70,000 for 20 critical discoveries in Wear OS and Android Automotive OS and another $116,000 for 50 reports concerning issues in Nest, Fitbit, and Wearables...]]>
2024-03-22T11:01:39+00:00 https://www.schneier.com/blog/archives/2024/03/google-pays-10m-in-bug-bounties-in-2023.html www.secnews.physaphae.fr/article.php?IdArticle=8468408 False Vulnerability,Studies,Mobile None 3.0000000000000000
Dark Reading - Informationweek Branch Akamai Research trouve 29% des attaques Web API Target<br>Akamai Research Finds 29% of Web Attacks Target APIs 2024-03-20T19:11:48+00:00 https://www.darkreading.com/application-security/akamai-research-finds-29-of-web-attacks-target-apis www.secnews.physaphae.fr/article.php?IdArticle=8467497 False Studies None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'étude découvre 27% de pic dans les ransomwares;Rendement de 8% aux demandes<br>Study Uncovers 27% Spike in Ransomware; 8% Yield to Demands Thales latest report also suggests less than half of organizations have a formal ransomware response plan]]> 2024-03-20T16:00:00+00:00 https://www.infosecurity-magazine.com/news/27-spike-ransomware-8-yield/ www.secnews.physaphae.fr/article.php?IdArticle=8467398 False Ransomware,Studies None 2.0000000000000000 Global Security Mag - Site de news francais Palo Alto Networks dévoile son nouveau rapport sur l\'état de la sécurité OT Investigations]]> 2024-03-20T14:36:21+00:00 https://www.globalsecuritymag.fr/palo-alto-networks-devoile-son-nouveau-rapport-sur-l-etat-de-la-securite-ot.html www.secnews.physaphae.fr/article.php?IdArticle=8467371 False Studies,Industrial None 4.0000000000000000 IndustrialCyber - cyber risk firms for industrial Trend Micro découvre la Terre des pirates de krahang exploitant la confiance intergouvernementale pour les attaques intergouvernementales<br>Trend Micro uncovers Earth Krahang hackers exploiting intergovernmental trust for cross-government attacks Trend Micro researchers disclosed that since early 2022 they have been tracking Earth Krahang, an APT (advanced persistent... ]]> 2024-03-20T10:26:22+00:00 https://industrialcyber.co/news/trend-micro-uncovers-earth-krahang-hackers-exploiting-intergovernmental-trust-for-cross-government-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8467250 False Studies,Prediction None 3.0000000000000000 Zimperium - cyber risk firms for mobile The Growing Risks of On-Device Fraud L'image est douloureusement claire...Les organisations ne voient pas de ralentissement de la fraude financière ciblant les appareils mobiles.MasterCard a récemment partagé que leurs données montrent une tendance de 41 milliards de dollars de perte liée à la fraude en 2022, atteignant 48 milliards de dollars d'ici 2023. JuniperResearch met le nombre à 91 milliards de dollars d'ici 2028 et [& # 8230;]
>The picture is painfully clear . . . organizations are not seeing a slowdown in financial fraud targeting  mobile devices. Mastercard recently shared that their data shows a trend of $41billion in fraud-related loss in 2022, growing to $48billion by 2023.  JuniperResearch puts the number at $91billion by 2028 and […] ]]>
2024-03-19T13:00:00+00:00 https://zimpstage.wpengine.com/blog/the-growing-risks-of-on-device-fraud/ www.secnews.physaphae.fr/article.php?IdArticle=8470945 False Studies,Mobile,Prediction None 4.0000000000000000
Kaspersky - Kaspersky Research blog Paysage de menace pour les systèmes d'automatisation industrielle.H2 2023<br>Threat landscape for industrial automation systems. H2 2023 Kaspersky ICS CERT shares industrial threat statistics for H2 2023: most commonly detected malicious objects, threat sources, threat landscape by industry and region.]]> 2024-03-19T10:00:20+00:00 https://securelist.com/threat-landscape-for-industrial-automation-systems-h2-2023/112153/ www.secnews.physaphae.fr/article.php?IdArticle=8466577 False Threat,Studies,Industrial None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le nouveau rapport suggère une augmentation des actifs SaaS, le partage des données des employés<br>New Report Suggests Surge in SaaS Assets, Employee Data Sharing DoControl said one in six employees was found to have shared company data via personal email]]> 2024-03-14T16:00:00+00:00 https://www.infosecurity-magazine.com/news/surge-saas-assets-employee-data/ www.secnews.physaphae.fr/article.php?IdArticle=8463867 False Studies,Cloud None 2.0000000000000000 Global Security Mag - Site de news francais Rapport sur la sécurité des données de Docontrol \\'s 2024 Rapport de sécurité des données SAAS a trouvé que les entreprises créent 286k de nouveaux actifs SaaS chaque semaine et 1 des 6 employés partagés des données avec des e-mails personnels<br>DoControl\\'s 2024 State of SaaS Data Security Report Found Companies Create 286K New SaaS Assets Weekly, and 1 out of 6 Employees Shared Company Data With Personal Email revues de produits
DoControl\'s 2024 State of SaaS Data Security Report Found Companies Create 286K New SaaS Assets Weekly, and 1 out of 6 Employees Shared Company Data With Personal Email. Increased exposure of SaaS assets greatly heightens risk for potential breaches - Product Reviews]]>
2024-03-14T14:56:45+00:00 https://www.globalsecuritymag.fr/docontrol-s-2024-state-of-saas-data-security-report-found-companies-create-286k.html www.secnews.physaphae.fr/article.php?IdArticle=8463871 False Studies,Cloud None 4.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Google a payé 10 millions de dollars en primes de bogues aux chercheurs en sécurité en 2023<br>Google Paid $10m in Bug Bounties to Security Researchers in 2023 Google revealed it paid $10m in bug bounty payments to more than 600 researchers in 2023, with the highest single payment being £113,337]]> 2024-03-14T11:30:00+00:00 https://www.infosecurity-magazine.com/news/google-paid-10m-bug-bounties/ www.secnews.physaphae.fr/article.php?IdArticle=8463733 False Studies None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les attaques de compte nuage ont augmenté de 16 fois en 2023<br>Cloud Account Attacks Surged 16-Fold in 2023 Red Canary said cloud account compromise detections rose 16-fold in 2023, becoming the fourth most prevalent technique used by threat actors]]> 2024-03-13T14:01:00+00:00 https://www.infosecurity-magazine.com/news/cloud-account-attacks-surged-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8463205 False Threat,Studies,Cloud None 4.0000000000000000 Silicon - Site de News Francais La boîte à outils du Cigref pour anticiper les cyberattaques 2024-03-13T13:36:33+00:00 https://www.silicon.fr/cigref-anticiper-cyberattaques-476803.html www.secnews.physaphae.fr/article.php?IdArticle=8463198 False Tool,Studies None 3.0000000000000000 Global Security Mag - Site de news francais Le nouveau rapport Mimecast trouve les cybercriminels capitalise sur les entreprises \\ 'le plus grand défaut: risque humain<br>New Mimecast report finds cybercriminals capitalise on businesses\\' biggest flaw: Human risk rapports spéciaux
New Mimecast report finds cybercriminals capitalise on businesses\' biggest flaw: Human risk Annual research report explores the State of Email and Collaboration Security, finding that 74% of all cyber breaches are caused by human factors - Special Reports]]>
2024-03-13T13:10:05+00:00 https://www.globalsecuritymag.fr/new-mimecast-report-finds-cybercriminals-capitalise-on-businesses-biggest-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=8463203 False Studies None 4.0000000000000000
Global Security Mag - Site de news francais 2024 Rapport de menace Sophos: Cybercrime on Main Street Détails Cyberstériques Face aux PME<br>2024 Sophos Threat Report: Cybercrime on Main Street Details Cyberthreats Facing SMBs rapports spéciaux
2024 Sophos Threat Report: Cybercrime on Main Street Details Cyberthreats Facing SMBs Data and Credential Theft Malware are Top Two Threats Against SMBs in 2023, Accounting for Nearly 50% of All Malware Sophos Detected Targeting this Market Segment Ransomware Still the Biggest Threat to SMBs; Business Email Compromise on the Rise, Along with More Sophisticated Social Engineering Tactics - Special Reports]]>
2024-03-13T08:30:49+00:00 https://www.globalsecuritymag.fr/2024-sophos-threat-report-cybercrime-on-main-street-details-cyberthreats-facing.html www.secnews.physaphae.fr/article.php?IdArticle=8463062 False Malware,Threat,Studies None 4.0000000000000000
Kaspersky - Kaspersky Research blog L'état de Stalkerware en 2023 & # 8211; 2024<br>The State of Stalkerware in 2023–2024 In this report, Kaspersky shares statistics on stalkerware detections, as well as insights into the impact of digital stalking in 2023 and the beginning of 2024, and advice for those affected.]]> 2024-03-13T08:00:40+00:00 https://securelist.com/state-of-stalkerware-2023/112135/ www.secnews.physaphae.fr/article.php?IdArticle=8463037 False Studies None 4.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'étude révèle les meilleures vulnérabilités dans les applications Web d'entreprise<br>Study Reveals Top Vulnerabilities in Corporate Web Applications Kaspersky said access control weaknesses and failures in data protection accounted for 70% of all flaws]]> 2024-03-12T17:45:00+00:00 https://www.infosecurity-magazine.com/news/top-vulnerabilities-corporate-web/ www.secnews.physaphae.fr/article.php?IdArticle=8462761 False Vulnerability,Studies None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'intelligence américaine prédit les cyber-menaces à venir pour 2024<br>US Intelligence Predicts Upcoming Cyber Threats for 2024 The Office of the Director of National Intelligence (ODNI) has unveiled an unclassified version of its Annual Threat Assessment of the US Intelligence Community]]> 2024-03-12T17:00:00+00:00 https://www.infosecurity-magazine.com/news/us-intelligence-predicts-cyber/ www.secnews.physaphae.fr/article.php?IdArticle=8462731 False Threat,Studies None 4.0000000000000000 Palo Alto Network - Site Constructeur 5 défis uniques pour l'IA en cybersécurité<br>5 Unique Challenges for AI in Cybersecurity Il y a des défis pour l'IA en cybersécurité dans des environnements réels avec une haute précision, nécessitant une spécialisation dans le domaine d'étude spécifique.
>There are challenges for AI in cybersecurity in real-world environments with high precision, requiring specialization in the specific field of study. ]]>
2024-03-12T16:55:14+00:00 https://www.paloaltonetworks.com/blog/2024/03/challenges-for-ai-in-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8462737 False Studies None 2.0000000000000000
Data Security Breach - Site de news Francais Tendances des campagnes de phishing : les pirates aiment le mardi ! 2024-03-12T15:13:49+00:00 https://www.datasecuritybreach.fr/phishing-tuesday-mardi/ www.secnews.physaphae.fr/article.php?IdArticle=8462708 False Studies None 4.0000000000000000 SecurityWeek - Security News L'équipe de réponse à l'attaque de CISA \\ en sous-effectif: GAO<br>CISA\\'s OT Attack Response Team Understaffed: GAO GAO study finds that CISA does not have enough staff to respond to significant OT attacks in multiple locations at the same time. ]]> 2024-03-12T12:47:00+00:00 https://www.securityweek.com/cisas-ot-attack-response-team-understaffed-gao/ www.secnews.physaphae.fr/article.php?IdArticle=8462645 False Studies,Industrial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les trois quarts des victimes de cyber-incidents sont des petites entreprises<br>Three-Quarters of Cyber Incident Victims Are Small Businesses Three-quarters of cyber-incidents Sophos responded to involved small businesses in 2023, with attackers\' main goal being data theft]]> 2024-03-12T12:20:00+00:00 https://www.infosecurity-magazine.com/news/cyber-incident-victims-small/ www.secnews.physaphae.fr/article.php?IdArticle=8462620 False Studies None 3.0000000000000000 Bleeping Computer - Magazine Américain Google a payé 10 millions de dollars en récompenses de primes de bogue l'année dernière<br>Google paid $10 million in bug bounty rewards last year Google awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly reporting security flaws in the company\'s products and services. [...]]]> 2024-03-12T12:00:00+00:00 https://www.bleepingcomputer.com/news/google/google-paid-10-million-in-bug-bounty-rewards-last-year/ www.secnews.physaphae.fr/article.php?IdArticle=8462730 False Studies None 2.0000000000000000