www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T09:26:01+00:00 www.secnews.physaphae.fr Global Security Mag - Site de news francais Le Forum InCyber et son partenaire Hexatrust présentent le Baromètre des fuites de données personnelles et alertent sur le besoin de repenser les stratégies cyber des organisations autour du modèle Zero Trust Investigations]]> 2025-03-19T20:12:32+00:00 https://www.globalsecuritymag.fr/le-forum-incyber-et-son-partenaire-hexatrust-presentent-le-barometre-des-fuites.html www.secnews.physaphae.fr/article.php?IdArticle=8656777 False None None 3.0000000000000000 Global Security Mag - Site de news francais CrowdStrike collabore avec NVIDIA Business]]> 2025-03-19T20:06:56+00:00 https://www.globalsecuritymag.fr/crowdstrike-collabore-avec-nvidia.html www.secnews.physaphae.fr/article.php?IdArticle=8656758 False None None 3.0000000000000000 HackRead - Chercher Cyber 11 hackers de l'État-nation exploitent une faille Windows non corrigée depuis 2017<br>11 Nation-State Hackers Exploit Unpatched Windows Flaw Since 2017 Microsoft refuses to patch serious Windows shortcut vulnerability abused in global espionage campaigns!]]> 2025-03-19T20:00:30+00:00 https://hackread.com/nation-state-hackers-exploit-windows-unpatched-flaw-2017/ www.secnews.physaphae.fr/article.php?IdArticle=8656765 False Vulnerability,Threat None 3.0000000000000000 Dark Reading - Informationweek Branch Cytex dévoile Aicenturion<br>Cytex Unveils AICenturion 2025-03-19T19:57:32+00:00 https://www.darkreading.com/cybersecurity-operations/cytex-unveils-aicenturion www.secnews.physaphae.fr/article.php?IdArticle=8656789 False None None 2.0000000000000000 Recorded Future - FLux Recorded Future La police provinciale canadienne semble utiliser des logiciels espions commerciaux avancés<br>Canadian provincial police appear to be using advanced commercial spyware Researchers at the Citizen Lab say they traced a commercial spyware customer\'s internet protocol address to the headquarters of Ontario Provincial Police.]]> 2025-03-19T19:38:24+00:00 https://therecord.media/ontario-police-citizen-lab-spyware-report www.secnews.physaphae.fr/article.php?IdArticle=8656766 False Legislation,Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch Les entreprises prennent le contrôle de LLM sur-partage avec l'autorisation Genai Security \\<br>Enterprises Gain Control Over LLM Oversharing With Prompt Security\\'s GenAI Authorization 2025-03-19T19:34:59+00:00 https://www.darkreading.com/application-security/control-over-llm-oversharing-genai-authorization www.secnews.physaphae.fr/article.php?IdArticle=8656762 False None None 3.0000000000000000 Dark Reading - Informationweek Branch Infosys règle 17,5 millions de dollars en recours collectif après une violation de tiers étendue<br>Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach Several major companies in the finance sector were impacted by the third-party breach, prompting them to notify thousands of customers of their compromised data.]]> 2025-03-19T19:29:03+00:00 https://www.darkreading.com/cyberattacks-data-breaches/infosys-settles-175m-class-action-lawsuit-third-party-breach www.secnews.physaphae.fr/article.php?IdArticle=8656763 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Les femmes en cybersécurité et ISC2 annoncent le WICYS + ISC2 certifié en certification CybersecuritySM Camp de printemps<br>Women in CyberSecurity and ISC2 Announce the WiCyS + ISC2 Certified in CybersecuritySM Certification Spring Camp 2025-03-19T19:22:17+00:00 https://www.darkreading.com/cybersecurity-operations/women-in-cybersecurity-and-isc2-announce-the-wicys-isc2-certified-in-cybersecuritysm-certification-spring-camp www.secnews.physaphae.fr/article.php?IdArticle=8656764 False None None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chats Black Basta divulgués suggèrent que les responsables russes ont aidé le leader à l'échappement de l'Arménie<br>Leaked Black Basta Chats Suggest Russian Officials Aided Leader\\'s Escape from Armenia The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing over 200,000 messages from September 2023 to September 2024, was published by a Telegram user @ExploitWhispers last month. According to an analysis of the messages by cybersecurity company]]> 2025-03-19T19:20:00+00:00 https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html www.secnews.physaphae.fr/article.php?IdArticle=8656709 False Ransomware None 3.0000000000000000 Global Security Mag - Site de news francais Le temps est venu de reprendre le contrôle de notre cybersécurité Points de Vue]]> 2025-03-19T19:17:17+00:00 https://www.globalsecuritymag.fr/le-temps-est-venu-de-reprendre-le-controle-de-notre-cybersecurite.html www.secnews.physaphae.fr/article.php?IdArticle=8656759 False None None 2.0000000000000000 Global Security Mag - Site de news francais Forcepoint a annoncé trois nominations de leadership stratégique<br>Forcepoint announced three strategic leadership appointments Business News
Forcepoint Strengthens Executive Leadership Team to Drive AI-Powered Data Security Innovation Company appoints data and security risk veterans to accelerate innovation and execution of Data Security Everywhere architecture - Business News]]>
2025-03-19T19:14:31+00:00 https://www.globalsecuritymag.fr/forcepoint-announced-three-strategic-leadership-appointments.html www.secnews.physaphae.fr/article.php?IdArticle=8656760 False None None 3.0000000000000000
Bleeping Computer - Magazine Américain Campagne de logiciels malveillants \\ 'Dollyway \\' a violé 20 000 sites WordPress<br>Malware campaign \\'DollyWay\\' breached 20,000 WordPress sites A malware operation dubbed \'DollyWay\' has been underway since 2016, compromising over 20,000 WordPress sites globally to redirect users to malicious sites. [...]]]> 2025-03-19T19:12:00+00:00 https://www.bleepingcomputer.com/news/security/malware-campaign-dollyway-breached-20-000-wordpress-sites/ www.secnews.physaphae.fr/article.php?IdArticle=8656804 False Malware None 3.0000000000000000 TechRepublic - Security News US Alerte d'escroquerie: FBI \\ 'de plus en plus voyant \\' malware distribué dans des convertisseurs de documents<br>Scam Alert: FBI \\'Increasingly Seeing\\' Malware Distributed In Document Converters FBI warns computer users to keep an eye out for malware, including ransomware, distributed through working document converters.]]> 2025-03-19T19:11:34+00:00 https://www.techrepublic.com/article/news-fbi-document-converters-malware-scam/ www.secnews.physaphae.fr/article.php?IdArticle=8656761 False Ransomware,Malware None 2.0000000000000000 Recorded Future - FLux Recorded Future La Turquie restreint les médias sociaux après l'arrestation du principal rival du président \\<br>Turkey restricts social media following arrest of president\\'s main rival Following the detention of Istanbul Mayor Ekrem İmamoğlu - widely seen as President Recep Tayyip Erdoğan\'s main political rival - Turkey appears to have restricted several major social media platforms.]]> 2025-03-19T19:05:10+00:00 https://therecord.media/turkey-restricts-social-media-imamoglu-arrest www.secnews.physaphae.fr/article.php?IdArticle=8656751 False None None 3.0000000000000000 HackRead - Chercher Cyber Secpod lance Saner Cloud: A révolutionnaire CNApp pour la cybersécurité préventive<br>SecPod launches Saner Cloud: A Revolutionary CNAPP For Preventive Cybersecurity Bengaluru, India, 19th March 2025, CyberNewsWire]]> 2025-03-19T18:53:14+00:00 https://hackread.com/secpod-launches-saner-cloud-a-revolutionary-cnapp-for-preventive-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8656750 False Cloud None 3.0000000000000000 DarkTrace - DarkTrace: AI bases detection Survey findings: How is AI Impacting the SOC? Part 3/4: Darktrace releases insights on the State of AI in cybersecurity. This blog discusses the impact of AI-powered attacks and the capabilities of AI defense on the SOC.]]> 2025-03-19T18:01:32+00:00 https://www.darktrace.com/blog/survey-findings-how-is-ai-impacting-the-soc www.secnews.physaphae.fr/article.php?IdArticle=8657147 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain La violation des données de l'Union de l'éducation de Pennsylvanie a frappé 500 000 personnes<br>Pennsylvania education union data breach hit 500,000 people The Pennsylvania State Education Association (PSEA), the largest public-sector union in Pennsylvania, is notifying over half a million individuals that attackers stole their personal information in a July 2024 security breach. [...]]]> 2025-03-19T17:38:25+00:00 https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/ www.secnews.physaphae.fr/article.php?IdArticle=8656787 False Data Breach None 3.0000000000000000 Dark Reading - Informationweek Branch L'adoption des nuages ​​de l'IA est en proie à des cyber erreurs<br>AI Cloud Adoption Is Rife With Cyber Mistakes Research finds that organizations are granting root access by default and making other big missteps, including a Jenga-like building concept, in deploying and configuring AI services in cloud deployments.]]> 2025-03-19T17:05:03+00:00 https://www.darkreading.com/cloud-security/ai-cloud-adoption-cyber-mistakes www.secnews.physaphae.fr/article.php?IdArticle=8656742 False Cloud None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Regardez ce webinaire pour apprendre à éliminer les attaques basées sur l'identité, avant qu'elles se produisent<br>Watch This Webinar to Learn How to Eliminate Identity-Based Attacks-Before They Happen In today\'s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks-like phishing, adversary-in-the-middle, and MFA bypass-remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcoming]]> 2025-03-19T17:05:00+00:00 https://thehackernews.com/2025/03/watch-this-webinar-to-learn-how-to.html www.secnews.physaphae.fr/article.php?IdArticle=8656669 False Tool None 2.0000000000000000 Recorded Future - FLux Recorded Future L'armée IT Ukraine \\ continue d'attaques contre la Russie malgré le battage médiatique décroissant<br>Ukraine\\'s IT Army keeps up attacks on Russia despite waning media hype According to a new report by Russian cybersecurity firm F6, the number of cyberattacks launched by the IT Army against Russia has risen sharply over the past year.]]> 2025-03-19T16:56:46+00:00 https://therecord.media/it-army-keeps-up-attacks-on-russia-ukraine www.secnews.physaphae.fr/article.php?IdArticle=8656733 False None None 3.0000000000000000 Recorded Future - FLux Recorded Future La suppression de Trump Admin \\ des commissaires démocrates à la FTC pourrait déplacer ses efforts de confidentialité<br>Trump admin\\'s removal of Democratic FTC commissioners could shift its privacy efforts The Trump administration\'s removal of two Democratic Federal Trade Commission officials on Tuesday could have deep implications for how the agency regulates big tech and safeguards consumer privacy, experts say.]]> 2025-03-19T16:34:00+00:00 https://therecord.media/trump-admin-removal-of-ftc-commissioners-could-shift-privacy-efforts www.secnews.physaphae.fr/article.php?IdArticle=8656734 False None None 3.0000000000000000 Bleeping Computer - Magazine Américain L'armée ukrainienne ciblait dans de nouveaux signaux<br>Ukrainian military targeted in new Signal spear-phishing attacks Ukraine\'s Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country\'s army forces. [...]]]> 2025-03-19T16:30:40+00:00 https://www.bleepingcomputer.com/news/security/ukrainian-military-targeted-in-new-signal-spear-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656774 False Malware None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Fauteur de raccourci Windows exploité par 11 groupes parrainés par l'État<br>Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups Newly discovered vulnerability ZDI-CAN-25373 takes advantage of Windows shortcuts has been exploited by 11 state-sponsored groups since 2017]]> 2025-03-19T16:30:00+00:00 https://www.infosecurity-magazine.com/news/zdican25373-exploited-state/ www.secnews.physaphae.fr/article.php?IdArticle=8656731 False Vulnerability None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Clearfake infecte 9 300 sites, utilise un faux recaptcha et des tourniquets pour répandre les voleurs d'informations<br>ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress as a malware distribution vector. The]]> 2025-03-19T16:29:00+00:00 https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html www.secnews.physaphae.fr/article.php?IdArticle=8656670 False Malware,Threat None 2.0000000000000000 Amensty International - International Orgs Europe: les attaques de paragon mettent en évidence la crise des logiciels espions croissants de l'Europe<br>Europe: Paragon attacks highlight Europe\\'s growing spyware crisis Répondre à la publication d'un rapport de laboratoire citoyen identifiant plusieurs cas impliquant l'utilisation des logiciels espions de Paragon \\ contre les journalistes et les défenseurs des droits de l'homme en Italie, le chef du laboratoire de sécurité d'Amnesty International \\, Donncha Ó Cearbhaill.
>Responding to the publication of a Citizen Lab report identifying multiple cases involving the use of Paragon\'s spyware against journalists and human rights defenders in Italy, the Head of Amnesty International\'s Security Lab, Donncha Ó Cearbhaill, said: “The alarming discovery that Paragon\'s highly invasive Graphite spyware has been used against human rights defenders and journalists in Italy […] ]]>
2025-03-19T16:15:07+00:00 https://securitylab.amnesty.org/latest/2025/03/europe-paragon-attacks-highlight-europes-growing-spyware-crisis/ www.secnews.physaphae.fr/article.php?IdArticle=8656729 False None None 4.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Le Congrès devrait remonter la loi de 2015 sur le partage d'informations, a déclaré le personnel de Top Hill<br>Congress should re-up 2015 information-sharing law, top Hill staffer says Les législateurs doivent également prendre des mesures sur la législation pour mieux harmoniser les réglementations fédérales de cybersécurité, le directeur du personnel démocrates \\ 'au sein d'un comité sénatorial clé.
>Lawmakers also need to take action on legislation to better harmonize federal cybersecurity regulations, Democrats\' staff director on a key Senate committee said. ]]>
2025-03-19T16:03:35+00:00 https://cyberscoop.com/congress-should-re-up-2015-information-sharing-law-top-hill-staffer-says/ www.secnews.physaphae.fr/article.php?IdArticle=8656720 False Legislation None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) 5 Détection et réponse des menaces d'identité incontournables pour la sécurité du super saaS<br>5 Identity Threat Detection & Response Must-Haves for Super SaaS Security Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaS-reliant organizations big and small]]> 2025-03-19T16:00:00+00:00 https://thehackernews.com/2025/03/5-identity-threat-detection-response.html www.secnews.physaphae.fr/article.php?IdArticle=8656657 False Threat,Cloud None 2.0000000000000000 HackRead - Chercher Cyber Les chercheurs utilisent l'IA jailbreak sur les LLMS pour créer un infostealer Chrome<br>Researchers Use AI Jailbreak on Top LLMs to Create Chrome Infostealer New Immersive World LLM jailbreak lets anyone create malware with GenAI. Discover how Cato Networks researchers tricked ChatGPT, Copilot, and DeepSeek into coding infostealers - In this case, a Chrome infostealer.]]> 2025-03-19T15:58:16+00:00 https://hackread.com/ai-jailbreak-on-top-llms-to-create-chrome-infostealer/ www.secnews.physaphae.fr/article.php?IdArticle=8656722 False Malware ChatGPT 3.0000000000000000 Recorded Future - FLux Recorded Future Un demi-million de personnes touchées par la violation des données de la Pennsylvania State Education Association<br>Half a million people impacted by Pennsylvania State Education Association data breach More than 500,000 people were impacted by a cyberattack on the Pennsylvania State Education Association (PSEA) that took place in July 2024.]]> 2025-03-19T15:51:09+00:00 https://therecord.media/half-a-million-impacted-pennsylvania-education-data-breach www.secnews.physaphae.fr/article.php?IdArticle=8656723 False Data Breach None 2.0000000000000000 Dark Reading - Informationweek Branch Les cybercriminels profitent de l'Ai, \\ 'Shadow \\' Alliances<br>Cybercriminals Taking Advantage Of AI, \\'Shadow\\' Alliances A Europol report says nation-state actors are increasingly working with organized crime networks to achieve geopolitical goals, including the destabilization of the EU.]]> 2025-03-19T15:44:55+00:00 https://www.darkreading.com/cyber-risk/cybercriminals-taking-advantage-ai-shadow-alliances www.secnews.physaphae.fr/article.php?IdArticle=8656985 False None None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Six pays supplémentaires identifiés comme des clients de Paragon Spyware suspectés<br>Six additional countries identified as suspected Paragon spyware customers Les chercheurs ont trouvé des déploiements de graphite présumés en Australie, au Canada, à Chypre, au Danemark, Israël et Singapour.
>Researchers found suspected Graphite deployments in Australia, Canada, Cyprus, Denmark, Israel and Singapore. ]]>
2025-03-19T15:40:57+00:00 https://cyberscoop.com/six-countries-suspected-paragon-spyware-customers/ www.secnews.physaphae.fr/article.php?IdArticle=8656721 False None None 4.0000000000000000
Zataz - Magazine Francais de secu Ransomwares : une menace grandissante et les solutions pour s\'en protéger 2025-03-19T15:21:03+00:00 https://www.zataz.com/ransomwares-une-menace-grandissante-et-les-solutions-pour-sen-proteger/ www.secnews.physaphae.fr/article.php?IdArticle=8656718 False Ransomware None 3.0000000000000000 UnderNews - Site de news "pirate" francais ESET : MirrorFace prend pour cible une institution diplomatique d\'Europe centrale MirrorFace, un acteur majeur dans le domaine cyber, lié à la Chine et ciblant habituellement des entités japonaises. Cet acteur a récemment élargi son champ d’action en attaquant une institution diplomatique en Europe centrale, utilisant l’Expo 2025 d’Osaka comme leurre. Tribune – ESET a collaboré avec l’institution diplomatique concernée et a mené une enquête approfondie. […] The post ESET : MirrorFace prend pour cible une institution diplomatique d'Europe centrale first appeared on UnderNews.]]> 2025-03-19T15:12:27+00:00 https://www.undernews.fr/hacking-hacktivisme/eset-mirrorface-prend-pour-cible-une-institution-diplomatique-deurope-centrale.html www.secnews.physaphae.fr/article.php?IdArticle=8656716 False None None 2.0000000000000000 SecurityWeek - Security News Infosys pour payer 17,5 millions de dollars en règlement sur la violation de données de 2023<br>Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach Le système Infosys McCamish a accepté de payer 17,5 millions de dollars pour régler six recours collectifs déposés contre une violation de données de 2023.
>Infosys McCamish System has agreed to pay $17.5 million to settle six class action lawsuits filed over a 2023 data breach. ]]>
2025-03-19T15:00:00+00:00 https://www.securityweek.com/infosys-to-pay-17-5-million-in-settlement-over-2023-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8656708 False Data Breach None 2.0000000000000000
CyberArk - Software Vendor Comment les cisos peuvent utiliser l'identité pour faire avancer la confiance zéro<br>How CISOs Can Use Identity to Advance Zero Trust AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I\'m talking about mutating polymorphic malware, prolonged ransomware sneak attacks...]]> 2025-03-19T14:15:38+00:00 https://www.cyberark.com/blog/how-cisos-can-use-identity-to-advance-zero-trust/ www.secnews.physaphae.fr/article.php?IdArticle=8656706 False Ransomware,Malware None 2.0000000000000000 Dark Reading - Informationweek Branch Pourquoi la cybersécurité a besoin de plus de leaders à l'esprit commercial<br>Why Cybersecurity Needs More Business-Minded Leaders The question is no longer "Are we compliant?" but "Are we truly resilient?"]]> 2025-03-19T14:00:00+00:00 https://www.darkreading.com/cybersecurity-operations/why-cybersecurity-needs-more-business-minded-leaders www.secnews.physaphae.fr/article.php?IdArticle=8656696 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine 752 000 Attaques de phishing du navigateur Marque 140% Augmentation de YOY<br>752,000 Browser Phishing Attacks Mark 140% Increase YoY A surge in browser-based phishing attacks has been recorded over the past year, with a 140% increase compared to 2023 according to Menlo Security]]> 2025-03-19T14:00:00+00:00 https://www.infosecurity-magazine.com/news/752000-browser-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656700 False None None 3.0000000000000000 Wired Threat Level - Security News Le pixel 9a de Google \\ coûte 499 $ et sous-cuit l'iPhone 16E<br>Google\\'s Pixel 9a Is $499 and Undercuts the iPhone 16e Arriving in April, this midrange Android smartphone gets a bigger battery, brighter screen, and even more AI.]]> 2025-03-19T14:00:00+00:00 https://www.wired.com/story/google-pixel-9a/ www.secnews.physaphae.fr/article.php?IdArticle=8656694 False Mobile None 2.0000000000000000 Recorded Future - FLux Recorded Future Le directeur du Citizen Lab \\ dissèque les logiciels espions et le marché \\ 'proliférant \\' pour celui-ci<br>The Citizen Lab\\'s director dissects spyware and the \\'proliferating\\' market for it In an interview with Recorded Future News, Deibert explained the technical aspects of the Citizen Lab\'s methods and how spyware companies continue to evolve to evade detection.]]> 2025-03-19T13:56:15+00:00 https://therecord.media/ron-deibert-citizen-lab-spyware-interview www.secnews.physaphae.fr/article.php?IdArticle=8656695 False Technical None 3.0000000000000000 Bleeping Computer - Magazine Américain New Arcane InfostEaler infecte YouTube, Discord Users via le jeu Cheats<br>New Arcane infostealer infects YouTube, Discord users via game cheats A newly discovered information-stealing malware called Arcane is stealing extensive user data, including VPN account credentials, gaming clients, messaging apps, and information stored in web browsers. [...]]]> 2025-03-19T13:52:08+00:00 https://www.bleepingcomputer.com/news/security/new-arcane-infostealer-infects-youtube-discord-users-via-game-cheats/ www.secnews.physaphae.fr/article.php?IdArticle=8656743 False Malware None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Cydome Analyse Lab Dookhtegan Cyber ​​Attack Attack contre les pétroliers iraniens, fournit une action d'atténuation<br>Cydome analyzes Lab Dookhtegan cyber attack on Iranian oil tankers, provides mitigation action Cydome’s maritime cyber research team just published an analysis of the cyber attack by Lab Dookhtegan on Iranian... ]]> 2025-03-19T13:25:47+00:00 https://industrialcyber.co/news/cydome-analyzes-lab-dookhtegan-cyber-attack-on-iranian-oil-tankers-provides-mitigation-action/ www.secnews.physaphae.fr/article.php?IdArticle=8656697 False None None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Cydome analyzes Lab Dookhtegan cyber attack on Iranian oil tankers, provides mitigation action Cydome’s maritime cyber research team just published an analysis of the cyber attack by Lab Dookhtegan on Iranian... ]]> 2025-03-19T13:25:47+00:00 https://industrialcyber.co/transport/cydome-analyzes-lab-dookhtegan-cyber-attack-on-iranian-oil-tankers-provides-mitigation-action/ www.secnews.physaphae.fr/article.php?IdArticle=8656850 False None None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial PRODAFT detects high-severity flaws in mySCADA myPRO Manager, warns of industrial network breaches Cyber threat intelligence firm PRODAFT has identified two critical OS command injection vulnerabilities in mySCADA myPRO Manager, a... ]]> 2025-03-19T13:21:01+00:00 https://industrialcyber.co/vulnerabilities/prodaft-detects-high-severity-flaws-in-myscada-mypro-manager-warns-of-industrial-network-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=8656851 False Vulnerability,Threat,Industrial None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Les législateurs républicains appuyent le DHS pour plus de détails sur la réponse fédérale à la volt soutenu par la RPC, les intrusions de typhon sel<br>Republican lawmakers press DHS for details on federal response to PRC-backed Volt, Salt Typhoon intrusions Republican members of the U.S. House Committee on Homeland Security have approached the Department of Homeland Security (DHS)... ]]> 2025-03-19T13:16:06+00:00 https://industrialcyber.co/critical-infrastructure/republican-lawmakers-press-dhs-for-details-on-federal-response-to-prc-backed-volt-salt-typhoon-intrusions/ www.secnews.physaphae.fr/article.php?IdArticle=8656699 False None None 3.0000000000000000 The Register - Site journalistique Anglais Ex-US Cyber ​​Command Chief: l'Europe et 5 yeux ne peuvent pas être entièrement reproduits américains<br>Ex-US Cyber Command chief: Europe and 5 Eyes can\\'t fully replicate US intel Cue deepening existential European dread as Rest of World contemplates Trump turning off the info tap If the United States stopped sharing cyber-threat intel with Ukraine, its European allies and the rest of the Five Eyes nations wouldn\'t be able to provide all the info Uncle Sam collects, according to former chief of US Cyber Command and the NSA General Paul Nakasone.…]]> 2025-03-19T13:01:12+00:00 https://go.theregister.com/feed/www.theregister.com/2025/03/19/nakasone_us_intel_sharing/ www.secnews.physaphae.fr/article.php?IdArticle=8656683 False None None 2.0000000000000000 Checkpoint - Fabricant Materiel Securite Le phishing de Firebase est-il une menace pour votre organisation?<br>Is Firebase Phishing a Threat to Your Organization? Les chercheurs de point de contrôle ont découvert une attaque de récolte des diplômes sophistiquée qui exploite Firebase, un service d'hébergement d'application Web populaire. Cette attaque implique la création de pages Web de phishing très convaincantes et conçues par des professionnels qui se font passer pour des services bien connus. Les attaquants utilisent également un fournisseur compromis pour envoyer des liens de phishing dans les correspondances e-mail existantes, ce qui rend l'arnaque encore plus trompeuse. Comment cela fonctionne: les attaquants tirent parti de Firebase pour héberger des pages Web de phishing qui imitent les services légitimes. En compromettant le compte de messagerie d'un fournisseur, les cybercriminels insérent ensuite les liens de phishing vers des threads de messagerie en cours. Cette tactique augmente la probabilité que le bénéficiaire faisait confiance au […]
>Check Point researchers have uncovered a sophisticated credential harvesting attack that leverages Firebase, a popular web application hosting service. This attack involves the creation of highly convincing and professionally designed phishing web pages that impersonate well-known services. The attackers also utilize a compromised vendor to send phishing links within existing email correspondences, making the scam even more deceptive. How it Works: The attackers leverage Firebase to host phishing web pages that mimic legitimate services. By compromising a vendor\'s email account, cyber criminals then insert phishing links into ongoing email threads. This tactic increases the likelihood of the recipient trusting the […] ]]>
2025-03-19T13:00:44+00:00 https://blog.checkpoint.com/securing-user-and-access/is-firebase-phishing-a-threat-to-your-organization/ www.secnews.physaphae.fr/article.php?IdArticle=8656681 False Threat None 2.0000000000000000
Palo Alto Network - Site Constructeur Palo Alto Networks aide à sécuriser Black Hat Asia 2025<br>Palo Alto Networks Helps Secure Black Hat Asia 2025 Palo Alto Networks sécurise Black Hat Asia 2025 avec fierté. Notre implication NOC et SOC assure une expérience de conférence ininterrompue pour les participants.
>Palo Alto Networks secures Black Hat Asia 2025 with pride. Our NOC and SOC involvement ensures uninterrupted conference experience for attendees. ]]>
2025-03-19T13:00:28+00:00 https://www.paloaltonetworks.com/blog/2025/03/secure-black-hat-asia-2025/ www.secnews.physaphae.fr/article.php?IdArticle=8656992 False Conference None 2.0000000000000000
Cyble - CyberSecurity Firm CISA ajoute deux vulnérabilités critiques (CVE-2025-24472 et CVE-2025-30066) au catalogue connu des vulnérabilités exploitées<br>CISA Adds Two Critical Vulnerabilities (CVE-2025-24472 and CVE-2025-30066) to the Known Exploited Vulnerabilities Catalog 2025-03-19T12:49:21+00:00 https://cyble.com/blog/cisa-alerts-users-of-cve-2025-24472/ www.secnews.physaphae.fr/article.php?IdArticle=8656685 False Tool,Vulnerability,Threat None 3.0000000000000000 DarkTrace - DarkTrace: AI bases detection Global Technology Provider Transforms Email Threat Detection with Darktrace To strengthen its distributed and complex operations, this global technology leader implemented Darktrace / EMAIL to monitor, detect, and mitigate potential email threats. Read the blog to discover their results.]]> 2025-03-19T12:35:01+00:00 https://www.darktrace.com/blog/global-technology-provider-transforms-email-threat-detection-with-darktrace www.secnews.physaphae.fr/article.php?IdArticle=8657146 False Threat None 3.0000000000000000 DarkTrace - DarkTrace: AI bases detection Le fournisseur de technologie mondial transforme la détection des menaces par e-mail avec DarkTrace<br>Global Technology Provider Transforms Email Threat Detection with Darktrace To strengthen its distributed and complex operations, this global technology leader implemented Darktrace / EMAIL to monitor, detect, and mitigate potential email threats. Read the blog to discover their results.]]> 2025-03-19T12:35:01+00:00 https://darktrace.com/blog/global-technology-provider-transforms-email-threat-detection-with-darktrace www.secnews.physaphae.fr/article.php?IdArticle=8656682 False Threat None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les défauts critiques de MyScada Mypro pourraient laisser les attaquants reprendre les systèmes de contrôle industriel<br>Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems. "These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially]]> 2025-03-19T12:29:00+00:00 https://thehackernews.com/2025/03/critical-myscada-mypro-flaws-could-let.html www.secnews.physaphae.fr/article.php?IdArticle=8656620 False Vulnerability,Industrial None 3.0000000000000000 HackRead - Chercher Cyber Les pirates masquent les logiciels malveillants Venomrat dans le fichier d'image du disque dur virtuel<br>Hackers Hide VenomRAT Malware Inside Virtual Hard Disk Image File Hackers are using .VHD files to spread VenomRAT malware, bypassing security software, reveals Forcepoint X-Labs. Learn how this stealthy attack works and how to protect yourself.]]> 2025-03-19T12:19:59+00:00 https://hackread.com/hackers-hide-venomrat-malware-virtual-hard-disk-files/ www.secnews.physaphae.fr/article.php?IdArticle=8656686 False Malware None 3.0000000000000000 Detection Engineering - Blog Sécu DET. Aile. Nous sommes # 107 - Yuouora.<br>Det. Eng. Weekly #107 - Youu arrrre a cinemaaa I can triage you foreverrrr]]> 2025-03-19T12:03:46+00:00 https://www.detectionengineering.net/p/det-eng-weekly-107-youu-arrrre-a www.secnews.physaphae.fr/article.php?IdArticle=8656666 False None None 2.0000000000000000 Bleeping Computer - Magazine Américain Flaw en clic zéro-cliquet corrigé exploité dans des attaques de logiciels spy<br>WhatsApp patched zero-click flaw exploited in Paragon spyware attacks WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon\'s Graphite spyware following reports from security researchers at the University of Toronto\'s Citizen Lab. [...]]]> 2025-03-19T12:02:20+00:00 https://www.bleepingcomputer.com/news/security/whatsapp-patched-zero-day-flaw-used-in-paragon-spyware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8656719 False Vulnerability,Threat None 2.0000000000000000 HackRead - Chercher Cyber Le rapport d'exposition à l'identité de Spycloud \\'s 2025 révèle l'échelle et les risques cachés des menaces d'identité numérique<br>SpyCloud\\'s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats Austin, TX, United States, 19th March 2025, CyberNewsWire]]> 2025-03-19T12:00:30+00:00 https://hackread.com/spyclouds-2025-identity-exposure-report-reveals-the-scale-and-hidden-risks-of-digital-identity-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8656668 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Brian Cox pour discuter de l'impact de l'informatique quantique sur Infoscurity Europe 2025<br>Brian Cox to Discuss Quantum Computing\\'s Impact at Infosecurity Europe 2025 World-renowned physicist, Professor Brian Cox, will headline day one of Infosecurity Europe, analyzing the science behind quantum computing and the challenges it brings]]> 2025-03-19T12:00:00+00:00 https://www.infosecurity-magazine.com/news/brian-cox-quantum-infosecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8656671 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Vulnérabilité de Fortinet exploitée dans Ransomware Attack, avertit CISA<br>Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns The US Cybersecurity and Infrastructure Security Agency added flaws in Fortinet and a popular GitHub Action to its Known Exploited Vulnerabilities catalog]]> 2025-03-19T11:30:00+00:00 https://www.infosecurity-magazine.com/news/fortinet-vulnerability-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8656673 False Ransomware,Vulnerability None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Sneaky 2FA rejoint Tycoon 2FA et EvilProxy en 2025 Phishing Surge<br>Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge Security firm Barracuda said it has detected more than a million phishing-as-a-service (PhaaS) attacks in 2025]]> 2025-03-19T11:30:00+00:00 https://www.infosecurity-magazine.com/news/sneaky-2fa-joins-tycoon-2fa/ www.secnews.physaphae.fr/article.php?IdArticle=8656672 False None None 3.0000000000000000 HackRead - Chercher Cyber Les 10 meilleurs mots de passe des pirates utilisent pour violer le RDP - est à vous en danger?<br>Top 10 Passwords Hackers Use to Breach RDP – Is Yours at Risk? Top 10 Passwords hackers use to breach RDP revealed! Weak credentials cause successful cyberattacks- check if yours is on the list and secure your system now.]]> 2025-03-19T10:59:29+00:00 https://hackread.com/top-10-passwords-hackers-use-to-breach-rdp/ www.secnews.physaphae.fr/article.php?IdArticle=8656656 False None None 2.0000000000000000 Global Security Mag - Site de news francais 17 avril Paris Matinale du CyberCercle : Les dynamiques sectorielles propres à répondre aux enjeux de cybersécurité Événements]]> 2025-03-19T10:54:06+00:00 https://www.globalsecuritymag.fr/17-avril-paris-matinale-du-cybercercle-les-dynamiques-sectorielles-propres-a.html www.secnews.physaphae.fr/article.php?IdArticle=8656659 False None None 2.0000000000000000 Global Security Mag - Site de news francais Le chercheur de ForcePoint X-Lab découvre l'utilisation du fichier d'image du disque dur virtuel pour les logiciels malveillants de Venomrat<br>Forcepoint X-Lab Researcher Discovers Use of Virtual Hard Disk Image File for VenomRAT malware Mise à jour malware
Forcepoint X-Lab Researcher Discovers Use of Virtual Hard Disk Image File for VenomRAT malware - Malware Update]]>
2025-03-19T10:50:37+00:00 https://www.globalsecuritymag.fr/forcepoint-x-lab-researcher-discovers-use-of-virtual-hard-disk-image-file-for.html www.secnews.physaphae.fr/article.php?IdArticle=8656660 False Malware None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Gartner avertit que l'agentique AI accélérera les prises de contrôle du compte<br>Gartner Warns Agentic AI Will Accelerate Account Takeovers Gartner has claimed that AI agents will reduce the time it takes to exploit exposed accounts]]> 2025-03-19T10:45:00+00:00 https://www.infosecurity-magazine.com/news/gartner-agentic-ai-accelerate/ www.secnews.physaphae.fr/article.php?IdArticle=8656658 False Threat None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) CISA met en garde contre l'exploitation active dans le compromis de la chaîne d'approvisionnement de l'action GitHub<br>CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, tj-actions/changed-files, to its Known Exploited Vulnerabilities (KEV) catalog. The high-severity flaw, tracked as CVE-2025-30066 (CVSS score: 8.6), involves the breach of the GitHub Action to inject malicious code that enables a remote]]> 2025-03-19T10:35:00+00:00 https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html www.secnews.physaphae.fr/article.php?IdArticle=8656612 False Vulnerability None 2.0000000000000000 DarkTrace - DarkTrace: AI bases detection Survey findings: AI Cyber Threats are a Reality, the People are Acting Now Part 2/4: Darktrace releases insights on the State of AI in cybersecurity. This blog discusses AI\'s impact on the cyber threat landscape.]]> 2025-03-19T10:10:37+00:00 https://www.darktrace.com/blog/survey-findings-ai-cyber-threats-are-a-reality-the-people-are-acting-now www.secnews.physaphae.fr/article.php?IdArticle=8657149 False Threat None 2.0000000000000000 Kaspersky - Kaspersky Research blog Sceau d'arcane: nous voulons toutes vos données<br>Arcane stealer: We want all your data The new Arcane stealer spreads via YouTube and Discord, collecting data from many applications, including VPN and gaming clients, network utilities, messaging apps, and browsers.]]> 2025-03-19T10:00:42+00:00 https://securelist.com/arcane-stealer/115919/ www.secnews.physaphae.fr/article.php?IdArticle=8656644 False None None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Europol met en garde contre «l'alliance Shadow» entre les États et les criminels<br>Europol Warns of “Shadow Alliance” Between States and Criminals Europol\'s annual report warns of a growing threat from aligned state and cybercrime groups, enabled by AI technologies]]> 2025-03-19T10:00:00+00:00 https://www.infosecurity-magazine.com/news/europol-warns-shadow-alliance/ www.secnews.physaphae.fr/article.php?IdArticle=8656648 False Threat None 2.0000000000000000 SecurityWeek - Security News Microsoft met en garde contre le nouveau logiciel malveillant Stilachirat<br>Microsoft Warns of New StilachiRAT Malware Microsoft a partagé des détails sur Stilachirat, un élément de logiciel malveillant évasif et persistant qui facilite le vol de données sensible.
>Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. ]]>
2025-03-19T09:59:07+00:00 https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8656647 False Malware None 2.0000000000000000
Global Security Mag - Site de news francais Varonis acquiert Cyral<br>Varonis Acquires Cyral Business News
Varonis Acquires Cyral to Reinvent Database Activity Monitoring Strategic DAM acquisition accelerates our mission to deliver AI-powered data security for all data, everywhere. - Business News]]>
2025-03-19T09:52:51+00:00 https://www.globalsecuritymag.fr/varonis-acquires-cyral.html www.secnews.physaphae.fr/article.php?IdArticle=8656649 False None None 2.0000000000000000
Sygnia - CyberSecurity Firm Briser la barrière virtuelle: de la coque Web à Ransomware<br>Breaking the Virtual Barrier: From Web-Shell to Ransomware VMware VM Escape Les vulnérabilités sont activement exploitées, permettant aux attaquants de prendre le contrôle des couches de virtualisation et de déployer des ransomwares. Ce conseil explore un scénario d'attaque du monde réel, une visibilité du défenseur et des stratégies d'atténuation pour améliorer la sécurité.
>VMware VM escape vulnerabilities are being actively exploited, allowing attackers to take control of virtualization layers and deploy ransomware. This advisory explores a real-world attack scenario, defender visibility, and mitigation strategies to enhance security. ]]>
2025-03-19T08:41:56+00:00 https://www.sygnia.co/threat-reports-and-advisories/breaking-the-virtual-barrier-web-shell-to-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8656680 False Ransomware,Vulnerability None 2.0000000000000000
Cyble - CyberSecurity Firm CERT NZ partage le conseil critique pour CVE-2025-24813 Vulnérabilité dans Apache Tomcat<br>CERT NZ Shares Critical Advisory for CVE-2025-24813 Vulnerability in Apache Tomcat 2025-03-19T08:35:18+00:00 https://cyble.com/blog/cert-nz-warns-of-cve-2025-24813-in-tomcat/ www.secnews.physaphae.fr/article.php?IdArticle=8656638 False Vulnerability,Threat None 2.0000000000000000 Korben - Bloger francais Google claque 32 milliards pour Wiz, sa plus grosse acquisition jamais réalisée 2025-03-19T08:14:00+00:00 https://korben.info/google-claque-32-milliards-pour-wiz-sa-plus-grosse-acquisition-jamais-realisee.html www.secnews.physaphae.fr/article.php?IdArticle=8656637 False Cloud None 2.0000000000000000 ProofPoint - Cyber Firms Au-delà de la formation: le point de preuve Zenguide élève la gestion des risques humains<br>Beyond Training: Proofpoint ZenGuide Elevates Human Risk Management 2025-03-19T08:01:36+00:00 https://www.proofpoint.com/us/blog/security-awareness-training/how-zenguide-elevates-human-risk-management www.secnews.physaphae.fr/article.php?IdArticle=8656819 False Tool,Vulnerability,Threat None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial U-Blox améliore le module de synchronisation NEO-F10T GNSS avec des fonctionnalités de sécurité avancées pour une infrastructure de télécommunications 5G<br>u-blox enhances NEO-F10T GNSS timing module with advanced security features for 5G, telecom infrastructure U-Blox, un fournisseur de technologies de positionnement et de communication à courte portée pour les marchés automobiles, industriels et consommateurs, a annoncé le ...
>u-blox, a vendor of positioning and short-range communication technologies for automotive, industrial and consumer markets, has announced the... ]]>
2025-03-19T07:39:53+00:00 https://industrialcyber.co/news/u-blox-enhances-neo-f10t-gnss-timing-module-with-advanced-security-features-for-5g-telecom-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8656628 False Industrial None 2.0000000000000000
ProofPoint - Cyber Firms CSPM vs DSPM: comprendre les différences<br>CSPM vs. DSPM: Understanding the differences 2025-03-19T07:36:56+00:00 https://www.proofpoint.com/us/blog/dspm/cspm-vs-dspm-understanding-the-differences www.secnews.physaphae.fr/article.php?IdArticle=8656818 False Vulnerability,Threat,Cloud None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Txone fait ses débuts Stellar 3.2 pour élever la sécurité des systèmes cyber-physiques avec détection et réponse<br>TXOne debuts Stellar 3.2 to elevate cyber-physical systems security with detection and response Txone Networks, un fournisseur de la sécurité des systèmes cyber-physiques (CPS), a annoncé la version 3.2 de sa solution stellaire, améliorant encore ...
>TXOne Networks, a vendor of cyber-physical systems (CPS) security, announced Version 3.2 of its Stellar solution, further enhancing... ]]>
2025-03-19T07:36:34+00:00 https://industrialcyber.co/news/txone-debuts-stellar-3-2-to-elevate-cyber-physical-systems-security-with-detection-and-response/ www.secnews.physaphae.fr/article.php?IdArticle=8656629 False None None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial Armis renforce la stratégie de cybersécurité avec Patrick McCue en tant que vice-président des partenaires mondiaux<br>Armis strengthens cybersecurity strategy with Patrick McCue as SVP of Global Partners La société de cybersécurité Armis a annoncé la nomination de Patrick McCue en tant que vice-président principal des partenaires mondiaux, ...
>Cybersecurity company Armis has announced the appointment of Patrick McCue as the senior vice president of global partners,... ]]>
2025-03-19T07:36:17+00:00 https://industrialcyber.co/news/armis-strengthens-cybersecurity-strategy-with-patrick-mccue-as-svp-of-global-partners/ www.secnews.physaphae.fr/article.php?IdArticle=8656630 False None None 2.0000000000000000
InformationSecurityBuzzNews - Site de News Securite Arrêter les infostelleurs sur leurs traces<br>Stopping Infostealers in their Tracks A new wave of malware is gaining traction in the form of infostealers, potent data-harvesting tools that have quickly become the go-to choice for threat actors due to their ability to quickly and effectively siphon sensitive information to sell on the dark web. Use of infostealers by groups specializing in ransomware surged by 266%, according [...]]]> 2025-03-19T06:52:02+00:00 https://informationsecuritybuzz.com/stopping-infostealers-in-their-tracks/ www.secnews.physaphae.fr/article.php?IdArticle=8656619 False Ransomware,Malware,Tool,Threat None 2.0000000000000000 HackRead - Chercher Cyber KnockNoc augmente le financement des semences pour évoluer sa technologie de contrôle d'accès au réseau juste à temps<br>Knocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control Technology Sydney, Australia, 19th March 2025, CyberNewsWire]]> 2025-03-19T05:06:01+00:00 https://hackread.com/knocknoc-raises-seed-funding-to-scale-its-just-in-time-network-access-control-technology/ www.secnews.physaphae.fr/article.php?IdArticle=8656605 False None None 2.0000000000000000 The State of Security - Magazine Américain L'intersection de la politique publique et de la cybersécurité: construire un cadre pour 2025 et au-delà<br>The Intersection of Public Policy and Cybersecurity: Building a Framework for 2025 and Beyond Introduction In a report published by Statista, cybercrime cost the world over $9 trillion in 2024 and is predicted to rise to nearly $14 trillion by 2028. These figures are a deep source of worry for governments and private businesses about what\'s next in the cyber threat landscape. The problem is that cyber threats are rising in both volume and scale. More so, the major threats are directed at emerging technologies, aiming to capitalize on weaknesses in emerging AI and ML systems. Cyber threats increasingly play a role in international conflicts, such as the recent reports of the “salt...]]> 2025-03-19T04:56:12+00:00 https://www.tripwire.com/state-of-security/intersection-public-policy-and-cybersecurity-building-framework-2025-and-beyond www.secnews.physaphae.fr/article.php?IdArticle=8656646 False Threat None 2.0000000000000000 ProofPoint - Cyber Firms Héros de la cybersécurité dès le premier jour: préparer de nouvelles embauches à être cyber-défenseurs<br>Cybersecurity Heroes from Day One: Preparing New Hires to be Cyber Defenders 2025-03-19T04:18:01+00:00 https://www.proofpoint.com/us/blog/security-awareness-training/onboarding-kit-prepare-new-hires-to-be-cyber-defenders www.secnews.physaphae.fr/article.php?IdArticle=8656821 False Tool,Threat,Cloud None 3.0000000000000000 ProofPoint - Cyber Firms 260 000 raisons de changer: le leader de l'infrastructure se négocie anormal pour un point de preuve<br>260,000 Reasons to Switch: Infrastructure Leader Trades In Abnormal for Proofpoint 2025-03-19T02:43:37+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/missed-spam-emails-threats-abnormals-blind-spot www.secnews.physaphae.fr/article.php?IdArticle=8656820 False Ransomware,Spam,Malware,Tool,Threat,Prediction,Technical None 2.0000000000000000 Silicon - Site de News Francais { Tribune Expert } - Comment (vraiment) réussir sa cellule de crise ? 2025-03-19T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/comment-reussir-cellule-crise-cyber-469143.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8656741 False None None 2.0000000000000000 Resecurity - cyber risk firms Dark Web Intelligence découvre les réseaux de trafic de fentanyl persistant sur Telegram - Partie 1<br>Dark Web Intelligence Uncovers Fentanyl Trafficking Networks Persisting on Telegram - Part 1 2025-03-19T00:00:00+00:00 https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8657111 False None None 3.0000000000000000 Silicon - Site de News Francais Wiz racheté par Alphabet : quels impacts sur l\'offre cyber de Google Cloud et celles des concurrents ? 2025-03-19T00:00:00+00:00 https://www.silicon.fr/Thematique/cybersecurite-1371/Breves/wiz-rachete-alphabet-impacts-google-cloud-concurrents-469099.htm#utm_source=IndexThematique&utm_medium=Rss&utm_campaign= www.secnews.physaphae.fr/article.php?IdArticle=8656687 False Cloud None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Trump déménage pour licencier des commissaires démocrates de la FTC<br>Trump moves to fire Democratic FTC commissioners Cette décision, qui, selon les critiques, est inconstitutionnelle, menace également de nombreuses enquêtes et application des agences concernant la vie privée et la cybersécurité.
>The move, which critics say is unconstitutional, also potentially threatens numerous agency investigations and enforcement around privacy and cybersecurity. ]]>
2025-03-18T23:49:37+00:00 https://cyberscoop.com/trump-moves-to-fire-democratic-ftc-commissioners/ www.secnews.physaphae.fr/article.php?IdArticle=8656577 False Legislation None 2.0000000000000000
Global Security Mag - Site de news francais Partner des réseaux Xona et Barrier pour améliorer la sécurité d'accès à l'OT<br>Xona and Barrier Networks partner to enhance OT access security Business News
Xona and Barrier Networks partner to enhance OT access security Barrier Networks is exhibiting at DTX Manchester at E121 - Business News]]>
2025-03-18T22:15:00+00:00 https://www.globalsecuritymag.fr/xona-and-barrier-networks-partner-to-enhance-ot-access-security.html www.secnews.physaphae.fr/article.php?IdArticle=8656569 False Industrial None 2.0000000000000000
Global Security Mag - Site de news francais Vecteurs d\'attaque initiaux : les comptes valides de plus en plus exploités en 2024 Malwares]]> 2025-03-18T22:12:02+00:00 https://www.globalsecuritymag.fr/vecteurs-d-attaque-initiaux-les-comptes-valides-de-plus-en-plus-exploites-en.html www.secnews.physaphae.fr/article.php?IdArticle=8656570 False None None 3.0000000000000000 Global Security Mag - Site de news francais French Telecom Orange Breach affirmé par des pirates: les chercheurs ont examiné l'échantillon de données fournies<br>French telecom Orange breach claimed by hackers: researchers reviewed the provided data sample Mise à jour malware
French telecom Orange breach claimed by hackers: researchers reviewed the provided data sample - Malware Update]]>
2025-03-18T22:06:44+00:00 https://www.globalsecuritymag.fr/french-telecom-orange-breach-claimed-by-hackers-researchers-reviewed-the.html www.secnews.physaphae.fr/article.php?IdArticle=8656553 False None None 3.0000000000000000
Global Security Mag - Site de news francais CloudFlare présente la gestion de la posture de sécurité<br>Cloudflare introduces Security Posture Managements Revues de produits
Cloudflare introduces Security Posture Managements to help businesses manage threats to all their data, apps and clouds–in a single view New capabilities will help organisations address threats fast and efficiently–without adding unnecessary vendors or costs - Product Reviews]]>
2025-03-18T22:02:50+00:00 https://www.globalsecuritymag.fr/cloudflare-introduces-security-posture-managements.html www.secnews.physaphae.fr/article.php?IdArticle=8656554 False None None 2.0000000000000000
Global Security Mag - Site de news francais Cloudflare, Inc. a lancé la plate-forme d'événements de menace CloudForce One Kense<br>Cloudflare, Inc. launched the Cloudforce One threat events platform Revues de produits
Cloudflare expands threat intelligence offering with new comprehensive, real-time events platform Customers can tap into insights from Cloudflare\'s global network – one of the largest in the world – which blocked an average of 227 billion cyber threats each day during Q4 2024 - Product Reviews]]>
2025-03-18T22:01:33+00:00 https://www.globalsecuritymag.fr/cloudflare-inc-launched-the-cloudforce-one-threat-events-platform.html www.secnews.physaphae.fr/article.php?IdArticle=8656555 False Threat None 2.0000000000000000
Global Security Mag - Site de news francais Idemia Secure Transactions annonce son premier accélérateur matériel conçu pour la cryptographie post-Quantum<br>IDEMIA Secure Transactions Announces its First Hardware Accelerator Designed for Post-Quantum Cryptography Revues de produits
IDEMIA Secure Transactions Announces its First Hardware Accelerator Designed for Post-Quantum Cryptography Reaffirming its leadership in post-quantum cryptography, this cutting-edge accelerator significantly boosts data protection against quantum computing risks. The technology ensures top-notch security, high performance, and a seamless user experience, essential for transitioning to quantum-resistant standards. - Product Reviews]]>
2025-03-18T21:59:20+00:00 https://www.globalsecuritymag.fr/idemia-secure-transactions-announces-its-first-hardware-accelerator-designed.html www.secnews.physaphae.fr/article.php?IdArticle=8656556 False None None 2.0000000000000000
Global Security Mag - Site de news francais Proofpoint établit une alliance mondiale avec Microsoft Business]]> 2025-03-18T21:57:01+00:00 https://www.globalsecuritymag.fr/proofpoint-etablit-une-alliance-mondiale-avec-microsoft.html www.secnews.physaphae.fr/article.php?IdArticle=8656557 False None None 2.0000000000000000 HackRead - Chercher Cyber Google acquiert Wiz pour enregistrer 32 milliards de dollars<br>Google Acquires Wiz for Record $32 Billion $32B Wiz acquisition: Google ramps up cloud security. Following Mandiant, this deal signals major GCP defense upgrade.]]> 2025-03-18T21:50:31+00:00 https://hackread.com/google-acquires-wiz-for-record-32-billion/ www.secnews.physaphae.fr/article.php?IdArticle=8656559 False Cloud None 2.0000000000000000 Global Security Mag - Site de news francais Les chercheurs de menace détectent 4x plus d'attaques compatibles avec l'identité alors que les infostateurs continuent de monter<br>Threat Researchers Detect 4x More Identity-Enabled Attacks as Infostealers Continue to Surge Rapports spéciaux
Threat Researchers Detect 4x More Identity-Enabled Attacks as Infostealers Continue to Surge Red Canary\'s 2025 Threat Detection Report highlights top and emerging cybersecurity threats, including fakeCAPTCHA, LLMJacking, and macOS malware Adversaries have access to more tools than ever to compromise organizations, fueling a rise in attacks and straining security teams None of the nearly 93,000 threats analyzed in this report were prevented by customers\' expansive security controls, including all leading endpoint protection (EPP) and IAM platforms - Special Reports]]>
2025-03-18T21:48:41+00:00 https://www.globalsecuritymag.fr/threat-researchers-detect-4x-more-identity-enabled-attacks-as-infostealers.html www.secnews.physaphae.fr/article.php?IdArticle=8656558 False Tool,Threat None 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) NOUVEAU \\ 'Règles Fichier Backdoor \\' Attack permet aux pirates d'injecter du code malveillant via des éditeurs de code AI<br>New \\'Rules File Backdoor\\' Attack Lets Hackers Inject Malicious Code via AI Code Editors Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. "This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent]]> 2025-03-18T21:13:00+00:00 https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html www.secnews.physaphae.fr/article.php?IdArticle=8656503 False None None 2.0000000000000000 Dark Reading - Informationweek Branch KNOSTIC NABS 11 M $ pour éliminer les fuites de données de l'IA d'entreprise<br>Knostic Nabs $11M to Eliminate Enterprise AI Data Leaks 2025-03-18T21:09:51+00:00 https://www.darkreading.com/cybersecurity-operations/knostic-nabs-millions-eliminate-enterprise-ai-data-leaks www.secnews.physaphae.fr/article.php?IdArticle=8656560 False None None 2.0000000000000000 Dark Reading - Informationweek Branch La société de défense sans espace aérien Bastille révèle les principales menaces de 2025<br>Wireless Airspace Defense Firm Bastille Reveals Top Threats of 2025 2025-03-18T20:58:01+00:00 https://www.darkreading.com/threat-intelligence/wireless-airspace-defense-firm-bastille-reveals-top-threats-of-2025 www.secnews.physaphae.fr/article.php?IdArticle=8656542 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Automox démontre un impact informatique et de sécurité avec le lancement de Precision Analytics<br>Automox Demonstrates IT and Security Impact With Launch of Precision Analytics 2025-03-18T20:54:49+00:00 https://www.darkreading.com/cybersecurity-analytics/automox-it-and-security-launch-precision-analytics www.secnews.physaphae.fr/article.php?IdArticle=8656543 False None None 2.0000000000000000 Dark Reading - Informationweek Branch Fujifilm signe un accord de collaboration stratégique avec Amazon Web Services<br>Fujifilm Signs Strategic Collaboration Agreement With Amazon Web Services 2025-03-18T20:47:27+00:00 https://www.darkreading.com/cloud-security/fujifilm-agreement-amazon-web-services www.secnews.physaphae.fr/article.php?IdArticle=8656544 False None None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Les infostelleurs ont alimenté les cyberattaques et accroché des références 2.1b l'année dernière<br>Infostealers fueled cyberattacks and snagged 2.1B credentials last year Les logiciels malveillants de volée d'informations bon marché ont augmenté en 2024, infectant 23 millions d'hôtes, selon Flashpoint.
>Inexpensive information-stealing malware surged in 2024, infecting 23 million hosts, according to Flashpoint. ]]>
2025-03-18T20:42:56+00:00 https://cyberscoop.com/infostealers-cybercrime-surged-2024-flashpoint/ www.secnews.physaphae.fr/article.php?IdArticle=8656540 False Malware None 3.0000000000000000