www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-12T04:44:11+00:00 www.secnews.physaphae.fr IndustrialCyber - cyber risk firms for industrial La CISA révèle des défauts de sécurité dans l'équipement d'infrastructure critique d'AVEVA, Ocean Data, Rockwell Automation<br>CISA reveals security flaws in critical infrastructure equipment from AVEVA, Ocean Data, Rockwell Automation L'Agence américaine de sécurité de la cybersécurité et de l'infrastructure (CISA) a publié mardi dix circuits (systèmes de contrôle industriel) qui fournissent ...
>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Tuesday ten ICS (industrial control systems) advisories that provide... ]]>
2024-08-15T09:15:36+00:00 https://industrialcyber.co/cisa/cisa-reveals-security-flaws-in-critical-infrastructure-equipment-from-aveva-ocean-data-systems-rockwell-automation/ www.secnews.physaphae.fr/article.php?IdArticle=8558045 False Industrial None 3.0000000000000000
Dark Reading - Informationweek Branch Le nouveau rapport ISAGCA explore les résultats zéro-trust dans la cybersécurité OT<br>New ISAGCA Report Explores Zero-Trust Outcomes in OT Cybersecurity 2024-08-14T19:49:37+00:00 https://www.darkreading.com/ics-ot-security/new-isagca-report-explores-zero-trust-outcomes-in-ot-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8557779 False Industrial None 3.0000000000000000 Dragos - CTI Society Analyse des ransomwares industriels de Dragos: Q2 2024<br>Dragos Industrial Ransomware Analysis: Q2 2024 Les informations fournies ici proviennent de chasseurs d'adversaires et d'analystes de la cyber-menace de l'intelligence et des analystes qui effectuent des recherches sur l'adversaire ... Le post Dragos Industrial Ransomware Analysis: Q2 2024 = "https://www.dragos.com"> dragos .
>Information provided here is sourced from Dragos OT Cyber Threat Intelligence adversary hunters and analysts who conduct research on adversary... The post Dragos Industrial Ransomware Analysis: Q2 2024 first appeared on Dragos.]]>
2024-08-14T13:00:00+00:00 https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q2-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8557618 False Ransomware,Threat,Studies,Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Red Lion fait ses débuts deux RTU programmables pour les environnements d'automatisation robustes<br>Red Lion debuts two programmable RTUs for rugged automation environments Red Lion, un fabricant de technologies qui permettent aux organisations industrielles d'accéder à accéder, à connecter et à visualiser leurs données, a annoncé ...
>Red Lion, a manufacturer of technologies that empower industrial organizations to access, connect, and visualize their data, announced... ]]>
2024-08-13T10:33:35+00:00 https://industrialcyber.co/news/red-lion-debuts-two-programmable-rtus-for-rugged-automation-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8556927 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Mitre recherche des contributions pour les évaluations ICS ATT & CK pour améliorer l'émulation<br>MITRE seeks contributions for ICS ATT&CK evaluations to enhance emulation Non-profit organization MITRE announced a call for intelligence contributions for ATT&CK evaluations addressing ICS (industrial control systems) to... ]]> 2024-08-13T10:23:18+00:00 https://industrialcyber.co/control-device-security/mitre-seeks-contributions-for-ics-attck-evaluations-to-enhance-emulation/ www.secnews.physaphae.fr/article.php?IdArticle=8556929 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Vulnérabilités critiques trouvées dans Ewon Cozy + Industrial VPN Gateways<br>Critical vulnerabilities found in Ewon Cosy+ industrial VPN gateways Des vulnérabilités de sécurité ont été détectées dans les passerelles VPN Ewon Cozy + Industrial qui permettent aux attaquants non authentifiés de gagner ...
>Security vulnerabilities have been detected in the Ewon Cosy+ industrial VPN gateways that allow unauthenticated attackers to gain... ]]>
2024-08-12T12:40:35+00:00 https://industrialcyber.co/industrial-cyber-attacks/critical-vulnerabilities-found-in-ewon-cosy-industrial-vpn-gateways/ www.secnews.physaphae.fr/article.php?IdArticle=8556357 False Vulnerability,Industrial None 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Outil d'accès à distance industriel Ewon Cozy + Vulnérable aux attaques d'accès racinaires<br>Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks. The elevated access could then be weaponized to decrypt encrypted firmware files and encrypted data such as passwords in configuration files, and even get correctly signed X.509 VPN certificates for foreign]]> 2024-08-12T12:27:00+00:00 https://thehackernews.com/2024/08/industrial-remote-access-tool-ewon-cosy.html www.secnews.physaphae.fr/article.php?IdArticle=8556227 False Tool,Vulnerability,Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Faits saillants hebdomadaires, 12 août 2024<br>Weekly OSINT Highlights, 12 August 2024 2024-08-12T10:35:06+00:00 https://community.riskiq.com/article/e60227f4 www.secnews.physaphae.fr/article.php?IdArticle=8556324 False Ransomware,Spam,Malware,Tool,Vulnerability,Threat,Mobile,Industrial,Cloud APT 28 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Adopter des tactiques stratégiques de gestion des patchs dans les environnements ICS dans le cadre de l'escalade des cyber-menaces<br>Adopting strategic patch management tactics across ICS environments amid escalating cyber threats À travers le domaine ICS (système de contrôle industriel), assurer la sécurité et l'intégrité opérationnelle est cruciale pour les organisations de divers ...
>Across the ICS (industrial control system) realm, ​​ensuring security and operational integrity is crucial for organizations in various... ]]>
2024-08-11T02:28:17+00:00 https://industrialcyber.co/features/adopting-strategic-patch-management-tactics-across-ics-environments-amid-escalating-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8555575 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial IEC publie la CEI 62443-2-1: 2024, établissant des normes de sécurité pour l'automatisation industrielle et les systèmes de contrôle<br>IEC publishes IEC 62443-2-1:2024, setting security standards for industrial automation and control systems La CEI (International Electrotechnical Commission) publiée cette semaine IEC 62443-2-1: 2024 Adjustant à la sécurité pour l'automatisation industrielle et les systèmes de contrôle ....
>The IEC (International Electrotechnical Commission) published this week IEC 62443-2-1:2024 addressing security for industrial automation and control systems.... ]]>
2024-08-09T12:07:11+00:00 https://industrialcyber.co/isa-iec-62443/iec-publishes-iec-62443-2-12024-setting-security-standards-for-industrial-automation-and-control-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8554658 False Industrial None 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) North Korean hackers exploit VPN update flaw to install malware 2024-08-09T00:21:24+00:00 https://community.riskiq.com/article/9625c1a0 www.secnews.physaphae.fr/article.php?IdArticle=8554412 False Malware,Tool,Vulnerability,Threat,Industrial,Technical None 2.0000000000000000 HackRead - Chercher Cyber Des milliers de systèmes de contrôle industriel exposés aux États-Unis, au Royaume-Uni, menacent l'approvisionnement en eau<br>Thousands of Exposed Industrial Control Systems in US, UK Threaten Water Supplies Thousands of Industrial Control Systems in the US and UK are vulnerable to cyberattacks, putting critical infrastructure like…]]> 2024-08-08T12:30:26+00:00 https://hackread.com/exposed-industrial-control-systems-us-uk-water-risk/ www.secnews.physaphae.fr/article.php?IdArticle=8554069 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Les censés révèlent plus de 40 000 appareils ICS vulnérables aux États-Unis, marquant les risques de sécurité dans les systèmes de construction et d'eau<br>Censys reveals over 40,000 vulnerable ICS devices in US, marking security risks in building and water systems Censys researchers analyzed the internet exposure of ICS devices in the U.S. and the U.K., finding over 40,000... ]]> 2024-08-08T10:55:48+00:00 https://industrialcyber.co/industrial-cyber-attacks/censys-reveals-over-40000-vulnerable-ics-devices-in-us-marking-security-risks-in-building-and-water-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8554015 False Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Mirai Botnet attaquant la vulnérabilité de traversée du répertoire Apache Ofbiz<br>Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability ## Snapshot Res]]> 2024-08-07T18:20:19+00:00 https://community.riskiq.com/article/cbed9166 www.secnews.physaphae.fr/article.php?IdArticle=8553600 False Malware,Vulnerability,Threat,Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial La nouvelle recherche sur l'État de ForeScout-Finite expose les risques de sécurité dans les routeurs IoT avec des composants logiciels obsolètes<br>New Forescout-Finite State research exposes security risks in OT, IoT routers with outdated software components Data from Forescout and Finite State revealed that OT (operational technology) and IoT (Internet of Things) cellular routers,... ]]> 2024-08-07T15:28:43+00:00 https://industrialcyber.co/threat-landscape/new-forescout-finite-state-research-exposes-security-risks-in-ot-iot-routers-with-outdated-software-components/ www.secnews.physaphae.fr/article.php?IdArticle=8553489 False Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Pungsan stressé: l'acteur de menace aligné par la RPDC exploite le NPM pour l'accès initial<br>Stressed Pungsan: DPRK-aligned threat actor leverages npm for initial access 2024-08-06T18:23:27+00:00 https://community.riskiq.com/article/2346de18 www.secnews.physaphae.fr/article.php?IdArticle=8552945 False Malware,Tool,Threat,Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial OT Security passe au point de terminaison & # 8211;Où les humains interagissent<br>OT Security Is Moving to the Endpoint – Where Humans Interact Lorsqu'on lui a demandé pourquoi il a volé les banques, le voleur de banque de l'ère de la dépression & # 160; Willie Sutton & # 160; a prétendument répondu: «Parce que c'est là que l'argent est.»Si ...
>When asked why he robbed banks, Depression-era bank robber Willie Sutton purportedly replied, “Because that\'s where the money is.” If... ]]>
2024-08-06T06:36:37+00:00 https://industrialcyber.co/expert/ot-security-is-moving-to-the-endpoint-where-humans-interact/ www.secnews.physaphae.fr/article.php?IdArticle=8552577 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Sécurité Xage, partenaire de Yokogawa Asia pour faire avancer la sécurité de la confiance zéro pour les opérations industrielles autonomes<br>Xage Security, Yokogawa Asia partner to advance zero trust security for autonomous industrial operations Xage Security and Yokogawa Engineering Asia Pte Ltd have announced a collaboration that aims to provide zero trust... ]]> 2024-08-05T17:56:41+00:00 https://industrialcyber.co/news/xage-security-yokogawa-asia-partner-to-advance-zero-trust-security-for-autonomous-industrial-operations/ www.secnews.physaphae.fr/article.php?IdArticle=8552239 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Fortinet Holsters OT Security Platform avec fonctionnalités SECOPS avancées<br>Fortinet bolsters OT security platform with advanced SecOps features ​​ Fortinet a annoncé lundi les mises à jour de sa plate-forme de sécurité OT, offrant aux clients un réseau et une sécurité sécurisés améliorés ...
>Fortinet announced on Monday updates to its OT security platform, providing customers with enhanced secure networking and security... ]]>
2024-08-05T14:46:08+00:00 https://industrialcyber.co/news/fortinet-bolsters-ot-security-platform-with-advanced-secops-features/ www.secnews.physaphae.fr/article.php?IdArticle=8552146 False Industrial None 3.0000000000000000
Fortinet - Fabricant Materiel Securite Sécuriser les systèmes cyber-physiques avec la plate-forme de sécurité Fortinet OT<br>Securing Cyber-Physical Systems with the Fortinet OT Security Platform As operational technology (OT) environments become more connected, they also become more vulnerable, requiring evolved security strategies, including ruggedized devices, secure remote access, and integrated OT-specific security tools. Learn about Fortinet\'s commitment to advancing its OT security platform.]]> 2024-08-05T13:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/securing-cyber-physical-systems-with-fortinet-ot-security-platform www.secnews.physaphae.fr/article.php?IdArticle=8552084 False Tool,Industrial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les appareils d'automatisation de Flaw Critical dans Rockwell permettent un accès non autorisé<br>Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP) programming and configuration commands. The flaw, which is assigned the CVE identifier CVE-2024-6242, carries a CVSS v3.1 score of 8.4. "A vulnerability exists in the affected products that allows a threat actor to]]> 2024-08-05T11:37:00+00:00 https://thehackernews.com/2024/08/critical-flaw-in-rockwell-automation.html www.secnews.physaphae.fr/article.php?IdArticle=8551870 False Vulnerability,Threat,Industrial None 4.0000000000000000 IndustrialCyber - cyber risk firms for industrial Amélioration de la sécurité nationale des infrastructures par harmonisation des normes de cybersécurité dans les environnements OT / ICS<br>Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments The global cybersecurity framework could significantly benefit from the harmonization of standards for OT (operational technology) and ICS... ]]> 2024-08-04T06:51:02+00:00 https://industrialcyber.co/features/enhancing-national-infrastructure-security-by-harmonization-of-cybersecurity-standards-in-ot-ics-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8551164 False Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Disney, Nike, IBM Signatures Anchor 3M Faux e-mails par jour<br>Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day A simple toggle in Proofpoint\'s email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough?]]> 2024-08-02T15:40:14+00:00 https://www.darkreading.com/cloud-security/disney-nike-ibm-signatures-3m-fake-emails www.secnews.physaphae.fr/article.php?IdArticle=8549870 False Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Donot APT GROUP ciblant le Pakistan<br>Donot APT Group Targeting Pakistan 2024-07-31T18:17:54+00:00 https://community.riskiq.com/article/03d1ee52 www.secnews.physaphae.fr/article.php?IdArticle=8548260 True Ransomware,Malware,Tool,Vulnerability,Threat,Mobile,Industrial,Technical None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Équipe NetControl, Nozomi pour fournir des services de cybersécurité avancés pour les environnements IoT, IoT<br>Netcontrol, Nozomi team to deliver advanced cybersecurity services for OT, IoT environments Netcontrol Group, a managed security service provider (MSSP), and Nozomi Networks Inc., a vendor of OT and IoT... ]]> 2024-07-31T16:49:35+00:00 https://industrialcyber.co/news/netcontrol-nozomi-team-to-deliver-advanced-cybersecurity-services-for-ot-iot-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8548155 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Armexa fait ses débuts sur la plate-forme d'opérations d'Iris pour les opérateurs industriels avec un support OT limité<br>Armexa debuts IRIS Operations Platform for industrial operators with limited OT support Armexa revealed on Wednesday the launch of its new IRIS Operations Platform developed to address the needs of... ]]> 2024-07-31T16:49:07+00:00 https://industrialcyber.co/news/armexa-debuts-iris-operations-platform-for-industrial-operators-with-limited-ot-support/ www.secnews.physaphae.fr/article.php?IdArticle=8548156 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le rapport sur l'enquête Cisco met en évidence la cybersécurité comme \\ 'la principale préoccupation, \\' l'identifie / OT Collaboration, Préparation de l'IA<br>Cisco survey report highlights cybersecurity as \\'top concern,\\' identifies IT/OT collaboration, AI preparedness Dans son premier & # 8216; État des réseaux industriels & # 8217;Rapport, Cisco a souligné les principales priorités de l'évolution des réseaux industriels ...
>​​In its initial ‘State of Industrial Networking’ report, Cisco highlighted the key priorities in the changing industrial networking... ]]>
2024-07-31T11:16:26+00:00 https://industrialcyber.co/ai/cisco-survey-report-highlights-cybersecurity-as-top-concern-identifies-it-ot-collaboration-ai-preparedness/ www.secnews.physaphae.fr/article.php?IdArticle=8547923 False Studies,Industrial None 3.0000000000000000
Global Security Mag - Site de news francais Salvador Technologies \\ 'Infrastructure critique et les clients industriels remis de la panne de crowdsstrike en quelques minutes<br>Salvador Technologies\\' Critical Infrastructure and Industrial Customers Recovered from CrowdStrike Outage within Minutes opinion
Salvador Technologies\' Critical Infrastructure and Industrial Customers Recovered from CrowdStrike Outage within Minutes Company\'s cyber-incident recovery platform enabled customers to maintain full operational continuity with no dependency on IT protocols - Opinion]]>
2024-07-30T18:09:34+00:00 https://www.globalsecuritymag.fr/salvador-technologies-critical-infrastructure-and-industrial-customers.html www.secnews.physaphae.fr/article.php?IdArticle=8547426 False Industrial None 3.0000000000000000
Fortinet - Fabricant Materiel Securite Quatre tendances clés de la technologie opérationnelle<br>Four Key Trends in Operational Technology Insights for CISOs about OT security trends based on six years of data from the annual Fortinet State of OT and Cybersecurity Report. Read more.]]> 2024-07-30T15:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/four-key-trends-in-operational-technology www.secnews.physaphae.fr/article.php?IdArticle=8547330 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial La plate-forme Salvador Technologies \\ 'permet une récupération rapide pour les clients lors de la panne Crowdstrike<br>Salvador Technologies\\' platform enables rapid recovery for clients during CrowdStrike outage Salvador Technologies‘ critical infrastructure and industrial clients swiftly recovered from a CrowdStrike outage in minutes, using the company\'s... ]]> 2024-07-30T11:22:22+00:00 https://industrialcyber.co/news/salvador-technologies-platform-enables-rapid-recovery-for-clients-during-crowdstrike-outage/ www.secnews.physaphae.fr/article.php?IdArticle=8547238 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial L'OT Defender Fellowship de l'US Doe \\ invite les demandes de Cyber ​​Defenders pour la cohorte 2025<br>US DOE\\'s OT Defender Fellowship invites applications from cyber defenders for 2025 cohort The U.S. Department of Energy (DOE) announced that applications are now open for its Operational Technology (OT) Defender... ]]> 2024-07-29T17:34:34+00:00 https://industrialcyber.co/utilities-energy-power-water-waste/us-does-ot-defender-fellowship-invites-applications-from-cyber-defenders-for-2025-cohort/ www.secnews.physaphae.fr/article.php?IdArticle=8546746 False Industrial None 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Weekly OSINT Highlights, 29 July 2024 2024-07-29T10:58:35+00:00 https://community.riskiq.com/article/72f3426d www.secnews.physaphae.fr/article.php?IdArticle=8546560 False Ransomware,Data Breach,Spam,Malware,Tool,Vulnerability,Threat,Legislation,Mobile,Industrial,Medical APT 28,APT 36 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Intensification de l'accent mis sur l'avancement de la sécurité des produits dans les environnements OT et ICS au milieu de l'escalade des cyber-menaces<br>Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats From a vendor’s perspective, the rising cyber threats and attacks have put a sharp focus on the need... ]]> 2024-07-28T09:29:07+00:00 https://industrialcyber.co/features/intensifying-focus-on-advancing-product-security-in-ot-and-ics-environments-amid-escalating-cyber-threats/ www.secnews.physaphae.fr/article.php?IdArticle=8545902 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le nouveau rapport de Bridewell met en évidence la diminution des attaques, une cyber-maturité améliorée parmi les organisations britanniques CNI<br>New Bridewell report highlights decrease in attacks, enhanced cyber maturity among UK CNI organizations A recent report by cybersecurity services firm Bridewell reveals that 61 percent of civil aviation cyber decision-makers have... ]]> 2024-07-26T12:14:54+00:00 https://industrialcyber.co/reports/new-bridewell-report-highlights-decrease-in-attacks-enhanced-cyber-maturity-among-uk-cni-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=8544739 False Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) FrostyGoop malware attack cut off heat in Ukraine during winter 2024-07-25T20:14:43+00:00 https://community.riskiq.com/article/cf8f8199 www.secnews.physaphae.fr/article.php?IdArticle=8544338 False Malware,Vulnerability,Threat,Industrial None 3.0000000000000000 Dark Reading - Informationweek Branch Notre eau est-elle sûre à boire?Sécuriser notre infrastructure critique<br>Is Our Water Safe to Drink? Securing Our Critical Infrastructure Our critical systems can be protected from looming threats by embracing a proactive approach, investing in education, and fostering collaboration between IT and OT professionals.]]> 2024-07-25T14:00:00+00:00 https://www.darkreading.com/ics-ot-security/is-our-water-safe-to-drink-securing-our-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8544141 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le nouveau rapport d'évaluation des risques de l'UE évalue la cybersécurité en Europe \\ Télécommunications, secteurs de l'électricité<br>New EU risk assessment report assesses cybersecurity in Europe\\'s telecommunications, electricity sectors EU Member States, supported by the European Commission and ENISA, the EU Agency for Cybersecurity, released the initial... ]]> 2024-07-25T13:45:14+00:00 https://industrialcyber.co/reports/new-eu-risk-assessment-report-assesses-cybersecurity-in-europes-telecommunications-electricity-sectors/ www.secnews.physaphae.fr/article.php?IdArticle=8544139 False Studies,Industrial None 4.0000000000000000 Global Security Mag - Site de news francais INDUSTRIAL CYBERSEC FORUM 2024 Le 6 novembre 2024 à L\'Embarcadère, Lyon Protégez vos infrastructures industrielles face aux cybermenaces grandissantes ! Événements]]> 2024-07-25T08:14:48+00:00 https://www.globalsecuritymag.fr/industrial-cybersec-forum-2024-le-6-novembre-2024-a-l-embarcadere-lyon-protegez.html www.secnews.physaphae.fr/article.php?IdArticle=8544009 False Industrial None 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Onyx Sleet utilise une gamme de logiciels malveillants pour recueillir l'intelligence pour la Corée du Nord<br>Onyx Sleet uses array of malware to gather intelligence for North Korea 2024-07-24T23:34:10+00:00 https://community.riskiq.com/article/31828df1 www.secnews.physaphae.fr/article.php?IdArticle=8544253 False Ransomware,Malware,Tool,Vulnerability,Threat,Industrial,Cloud,Technical,Commercial APT 38 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le rapport Otorio révèle des perturbations importantes des cyberattaques, des préoccupations croissantes dans le paysage de sécurité OT<br>OTORIO report reveals significant disruption from cyber attacks, growing concerns in OT security landscape OT cybersecurity firm OTORIO disclosed that 88 percent of security leaders cite moderate-severe disruption to their business over... ]]> 2024-07-24T14:34:15+00:00 https://industrialcyber.co/reports/otorio-report-reveals-significant-disruption-from-cyber-attacks-growing-concerns-in-ot-security-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=8543467 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Améliorer la sensibilisation à la sécurité à travers la culture, la formation et le leadership<br>Enhancing OT security awareness through culture, training, and leadership Les améliorations des technologies opérationnelles (OT) sensibilisent à la sécurité reposent sur l'intégration de la culture organisationnelle, de la formation ciblée et des engagements ...
>Enhancements in Operational Technology (OT) security awareness rely on the integration of organizational culture, focused training, and commitments... ]]>
2024-07-24T07:12:16+00:00 https://industrialcyber.co/sponsored/enhancing-ot-security-awareness-through-culture-training-and-leadership/ www.secnews.physaphae.fr/article.php?IdArticle=8543251 False Industrial None 3.0000000000000000
Dragos - CTI Society Protéger contre la menace malveillante ics de Frostygoop avec les bases de la cybersécurité OT<br>Protect Against the FrostyGoop ICS Malware Threat with OT Cybersecurity Basics Les informations fournies ici proviennent de chasseurs d'adversaires et d'analystes de la cyber-menace de l'intelligence et des analystes qui effectuent des recherches sur l'adversaire ... Le post protéger contre la menace malveillante ics de glaçage avec les bases de la cybersécurité est apparu pour la première fois sur dragos .
>Information provided here is sourced from Dragos OT Cyber Threat Intelligence adversary hunters and analysts who conduct research on adversary... The post Protect Against the FrostyGoop ICS Malware Threat with OT Cybersecurity Basics first appeared on Dragos.]]>
2024-07-23T18:38:42+00:00 https://www.dragos.com/blog/protect-against-frostygoop-ics-malware-targeting-operational-technology/ www.secnews.physaphae.fr/article.php?IdArticle=8542933 False Malware,Threat,Industrial None 4.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouveau ics malware \\ 'FrostyGoop \\' ciblant l'infrastructure critique<br>New ICS Malware \\'FrostyGoop\\' Targeting Critical Infrastructure Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January. Industrial cybersecurity firm Dragos has dubbed the malware FrostyGoop, describing it as the first malware strain to directly use Modbus TCP]]> 2024-07-23T16:24:00+00:00 https://thehackernews.com/2024/07/new-ics-malware-frostygoop-targeting.html www.secnews.physaphae.fr/article.php?IdArticle=8542679 False Malware,Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Zero Networks protège les appareils OT avec une microsingation améliorée pour bloquer le mouvement latéral<br>Zero Networks protects OT devices with improved microsegmentation for blocking lateral movement Zero Networks, un fournisseur de solutions de sécurité de confiance zéro, a introduit de nouvelles capacités de segmentation conçues pour bloquer le mouvement latéral ...
>Zero Networks, a provider of zero trust security solutions, introduced new segmentation capabilities designed to block lateral movement... ]]>
2024-07-23T14:16:21+00:00 https://industrialcyber.co/news/zero-networks-protects-ot-devices-with-improved-microsegmentation-for-blocking-lateral-movement/ www.secnews.physaphae.fr/article.php?IdArticle=8542781 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Salvador étend la plate-forme de récupération de cyberattaques dans le secteur maritime, l'industrie du transport maritime<br>Salvador expands cyber-attack recovery platform into maritime sector, shipping industry L'entreprise de récupération des données OT / ICS Salvador Technologies a signalé une augmentation de la demande pour sa plate-forme de récupération de cyber-attaque de ...
>OT/ICS data recovery firm Salvador Technologies has reported a surge in demand for its cyber-attack recovery platform from... ]]>
2024-07-23T14:13:19+00:00 https://industrialcyber.co/news/salvador-expands-cyber-attack-recovery-platform-into-maritime-sector-shipping-industry/ www.secnews.physaphae.fr/article.php?IdArticle=8542782 False Industrial None 3.0000000000000000
Bleeping Computer - Magazine Américain Frostygoop Malware Attack a coupé la chaleur en Ukraine en hiver<br>FrostyGoop malware attack cut off heat in Ukraine during winter Russian-linked malware was used in a January 2024 cyberattack to cut off the heating of over 600 apartment buildings in Lviv, Ukraine, for two days during sub-zero temperatures. [...]]]> 2024-07-23T13:35:04+00:00 https://www.bleepingcomputer.com/news/security/frostygoop-malware-attack-cut-off-heat-in-ukraine-during-winter/ www.secnews.physaphae.fr/article.php?IdArticle=8542878 False Malware,Industrial None 4.0000000000000000 IndustrialCyber - cyber risk firms for industrial Nozomi Networks fait ses débuts au capteur de sécurité initial intégré dans les systèmes de contrôle industriel<br>Nozomi Networks debuts initial security sensor embedded in industrial control systems Nozomi Networks a annoncé mardi un premier capteur de sécurité OT et IoT qui s'exécute dans Mitsubishi Electric Programmable ...
>Nozomi Networks announced Tuesday an initial OT and IoT security sensor that runs embedded in Mitsubishi Electric programmable... ]]>
2024-07-23T12:52:00+00:00 https://industrialcyber.co/news/nozomi-networks-debuts-initial-security-sensor-embedded-in-industrial-control-systems/ www.secnews.physaphae.fr/article.php?IdArticle=8542717 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Dragos détaille les nouveaux logiciels malveillants de FrostyGoop Ics à l'aide de Modbus TCP pour perturber les opérations OT dans le monde entier<br>Dragos details novel FrostyGoop ICS malware using Modbus TCP to disrupt OT operations worldwide La société de cybersécurité industrielle Dragos a révélé mardi Frostygoop, un neuvième malware qui cible les systèmes de contrôle industriel (ICS) et le ...
>Industrial cybersecurity firm Dragos disclosed Tuesday FrostyGoop, a ninth malware that targets industrial control systems (ICS) and the... ]]>
2024-07-23T11:57:30+00:00 https://industrialcyber.co/news/dragos-details-novel-frostygoop-ics-malware-using-modbus-tcp-to-disrupt-ot-operations-worldwide/ www.secnews.physaphae.fr/article.php?IdArticle=8542684 False Malware,Industrial None 3.0000000000000000
SecurityWeek - Security News Les logiciels malveillants de FrostyGoop Ics ont laissé les résidents de la ville ukrainienne sans chauffage<br>FrostyGoop ICS Malware Left Ukrainian City\\'s Residents Without Heating The FrostyGoop ICS malware was used recently in an attack against a Ukrainian energy firm that resulted in loss of heating for many buildings. ]]> 2024-07-23T09:03:04+00:00 https://www.securityweek.com/frostygoop-ics-malware-left-ukrainian-citys-residents-without-heating/ www.secnews.physaphae.fr/article.php?IdArticle=8542646 False Malware,Industrial None 3.0000000000000000 The Register - Site journalistique Anglais Les logiciels malveillants de Frostygoop ont arrêté la chaleur à 600 immeubles d'appartements ukrainiens<br>FrostyGoop malware shut off heat to 600 Ukraine apartment buildings First nasty to exploit Modbus to screw with operational tech devices A previously unseen malware, dubbed FrostyGoop, able to disrupt industrial processes was used in a cyberattack against a district energy company in Ukraine last northern winter, resulting in two days without heat for hundreds of people during sub-zero temperatures.…]]> 2024-07-23T09:00:45+00:00 https://go.theregister.com/feed/www.theregister.com/2024/07/23/frostygoop_ics_malware/ www.secnews.physaphae.fr/article.php?IdArticle=8542581 False Malware,Threat,Industrial None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Simple \\ 'FrostyGoop \\' Malware responsable de la désactivation de la chaleur des Ukrainiens en janvier<br>Simple \\'FrostyGoop\\' malware responsible for turning off Ukrainians\\' heat in January attack L'attaque est la dernière d'une chaîne ciblant l'infrastructure critique ukrainienne et illustre la facilité croissante de cibler les systèmes industriels.
>The attack is the latest in a string targeting Ukrainian critical infrastructure and illustrates the growing ease of targeting industrial systems. ]]>
2024-07-23T09:00:00+00:00 https://cyberscoop.com/frostygoop-ics-malware-dragos-ukraine/ www.secnews.physaphae.fr/article.php?IdArticle=8542583 False Malware,Industrial None 3.0000000000000000
Dark Reading - Informationweek Branch Nouvel ICS MALWORED SABOTAGE SERVICES DE CHÉRATION DE L'EAU EN UKRAINE<br>Novel ICS Malware Sabotaged Water-Heating Services in Ukraine Newly discovered "FrostyGoop" is the first ICS malware that can communicate directly with operational technology systems via the Modbus protocol.]]> 2024-07-23T09:00:00+00:00 https://www.darkreading.com/ics-ot-security/novel-ics-malware-sabotaged-water-heating-services-in-ukraine www.secnews.physaphae.fr/article.php?IdArticle=8542588 False Malware,Industrial None 3.0000000000000000 The State of Security - Magazine Américain Sécuriser divers environnements: gestion de la configuration de la sécurité<br>Securing Diverse Environments: Security Configuration Management In our technologically advanced era, where cyber threats and data breaches are constantly evolving, it\'s crucial for companies to focus on Security Configuration Management (SCM) to protect their resources and information. Whether dealing with infrastructure, cloud services, industrial installations, or outsourced solutions, each environment presents unique security challenges that require customized approaches and tools for effective protection. Let\'s explore SCM, its significance, and the specialized strategies and methods used in different settings. Understanding Security Configuration...]]> 2024-07-23T03:00:37+00:00 https://www.tripwire.com/state-of-security/securing-diverse-environments-security-configuration-management www.secnews.physaphae.fr/article.php?IdArticle=8542580 False Tool,Industrial,Cloud None 3.0000000000000000 Dark Reading - Informationweek Branch Les hacktivistes russes sanctionnés pour les attaques d'infrastructures critiques américaines<br>Russian Hacktivists Sanctioned for US Critical Infrastructure Attacks "CARR" hackers have managed to gain control over ICS and SCADA systems in the US and Europe.]]> 2024-07-22T17:06:02+00:00 https://www.darkreading.com/ics-ot-security/russian-hacktivists-sanctioned-attacks-us-critical-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8542151 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Des logiciels malveillants uniques identifiés dans Panchan Botnet avec des techniques de persistance avancées<br>Unique malware identified in Panchan botnet with advanced persistence techniques Les chercheurs de Nozomi Networks Labs ont détaillé une famille de logiciels malveillants unique détectée par leurs pots de miel qui remplace le ...
>Researchers from Nozomi Networks Labs have detailed a unique malware family detected by their honeypots that replaces the... ]]>
2024-07-22T10:49:07+00:00 https://industrialcyber.co/ransomware/unique-malware-identified-in-panchan-botnet-with-advanced-persistence-techniques/ www.secnews.physaphae.fr/article.php?IdArticle=8541960 False Malware,Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Waterfall Security fait ses débuts Hera pour un accès à distance sécurisé aux réseaux OT, améliorant la sécurité du système cyber-physique<br>Waterfall Security debuts HERA for secure remote access to OT networks, enhancing cyber-physical system safety Waterfall Security announced on Wednesday the launch of HERA – Hardware Enforced Remote Access, a new technology designed... ]]> 2024-07-17T17:19:34+00:00 https://industrialcyber.co/news/waterfall-security-debuts-hera-for-secure-remote-access-to-ot-networks-enhancing-cyber-physical-system-safety/ www.secnews.physaphae.fr/article.php?IdArticle=8539016 False Industrial None 2.0000000000000000 Recorded Future - FLux Recorded Future La police ukrainienne arrêt les cybercriminels présumés accusés de vol de sociétés industrielles<br>Ukraine police arrest suspected cybercriminals accused of theft from industrial companies 2024-07-17T13:59:07+00:00 https://therecord.media/ukraine-police-arrest-suspected-cybercriminals-theft www.secnews.physaphae.fr/article.php?IdArticle=8538880 False Legislation,Industrial None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial Hexagon fait ses débuts sur le cloud-natif Solution SaaS HXGN SDX2 pour transformer les installations industrielles avec des informations connectées<br>Hexagon debuts cloud-native SaaS solution HxGN SDx2 to transform industrial facilities with connected insights Digital reality solutions, combining sensor, software, and autonomous technologies company Hexagon launched on Wednesday its HxGN SDx2, a... ]]> 2024-07-17T13:42:52+00:00 https://industrialcyber.co/news/hexagon-debuts-cloud-native-saas-solution-hxgn-sdx2-to-transform-industrial-facilities-with-connected-insights/ www.secnews.physaphae.fr/article.php?IdArticle=8538877 False Industrial,Cloud None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le sénateur Warner fait pression pour une action immédiate sur les normes de cybersécurité obligatoires pour le secteur des soins de santé<br>Senator Warner pushes for immediate action on mandatory cybersecurity standards for healthcare sector U.S. Senator Mark R. Warner calls upon the administration to swiftly develop and implement mandatory minimum cyber standards... ]]> 2024-07-17T13:42:31+00:00 https://industrialcyber.co/medical/senator-warner-pushes-for-immediate-action-on-mandatory-cybersecurity-standards-for-healthcare-sector/ www.secnews.physaphae.fr/article.php?IdArticle=8538878 False Industrial,Medical APT 42 3.0000000000000000 Global Security Mag - Site de news francais Rapport Nozomi Networks : L\'industrie manufacturière critique cible principale des cyberattaque Investigations]]> 2024-07-17T08:32:43+00:00 https://www.globalsecuritymag.fr/rapport-nozomi-networks-l-industrie-manufacturiere-critique-cible-principale.html www.secnews.physaphae.fr/article.php?IdArticle=8538714 False Industrial,Industrial None 4.0000000000000000 Dark Reading - Informationweek Branch La défense de l'OT nécessite des contrôles d'agilité et proactifs<br>Defending OT Requires Agility, Proactive Controls As attackers set their sights on infrastructure, security teams need to reduce risk levels without compromising operational agility.]]> 2024-07-16T18:25:53+00:00 https://www.darkreading.com/ics-ot-security/defending-ot-requires-agility-proactive-controls www.secnews.physaphae.fr/article.php?IdArticle=8538710 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Le gouvernement australien oblige le cadre de cybersécurité, souligne la collaboration globale de l'OT / ICS<br>Australian government mandates cybersecurity framework, stresses global OT/ICS collaboration As the Australian financial year 2023-2024 concludes, the nation\'s Cyber and Infrastructure Security Centre (CISC) announced that the... ]]> 2024-07-15T17:21:06+00:00 https://industrialcyber.co/regulation-standards-and-compliance/australian-government-mandates-cybersecurity-framework-stresses-global-ot-ics-collaboration/ www.secnews.physaphae.fr/article.php?IdArticle=8537667 False Industrial None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial La collaboration internationale émerge comme critique pour stimuler la cybersécurité OT et ICS au milieu d'une menace croissante<br>International collaboration emerges as critical for boosting OT and ICS cybersecurity amid rising threat L'escalade des cyber-menaces et des attaques a nécessité une collaboration internationale accrue dans des environnements de cybersécurité OT et ICS à aborder ...
>Escalating cyber threats and attacks have necessitated heightened international collaboration in OT and ICS cybersecurity environments to address... ]]>
2024-07-14T05:53:56+00:00 https://industrialcyber.co/features/international-collaboration-emerges-as-critical-for-boosting-ot-and-ics-cybersecurity-amid-rising-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8536746 False Threat,Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial ISA lance MIMO, son modèle à grande langue propulsé par l'IA pour les informations avancées de cybersécurité OT<br>ISA launches Mimo, its AI-powered large-language model for advanced OT cybersecurity insights La Société internationale d'automatisation (ISA) a annoncé jeudi un nouveau modèle à grande langue (LLM) formé sur le contenu ISA ....
>The International Society of Automation (ISA) announced on Thursday a new large-language model (LLM) trained on ISA content.... ]]>
2024-07-12T12:23:05+00:00 https://industrialcyber.co/vendors/isa-launches-mimo-its-ai-powered-large-language-model-for-advanced-ot-cybersecurity-insights/ www.secnews.physaphae.fr/article.php?IdArticle=8535680 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Nozomi rapporte les défis du paysage et de la réglementation des menaces OT / IoT, mettant en évidence l'évolution mondiale de la cyber-menace<br>Nozomi reports on OT/IoT threat landscape and regulatory challenges, highlighting global cyber threat evolution Nozomi Networks Labs has released a report assessing the OT/IoT threat landscape by analyzing the latest ICS CVEs... ]]> 2024-07-11T12:23:01+00:00 https://industrialcyber.co/reports/nozomi-reports-on-ot-iot-threat-landscape-and-regulatory-challenges-highlighting-global-cyber-threat-evolution/ www.secnews.physaphae.fr/article.php?IdArticle=8534991 False Threat,Studies,Industrial None 4.0000000000000000 IndustrialCyber - cyber risk firms for industrial Emberot fait ses débuts améliorés OT PCAP Analyzer Tool pour le secteur de la cybersécurité industrielle<br>EmberOT debuts improved OT PCAP Analyzer tool for industrial cybersecurity sector EMBEROT, un fournisseur de solutions de surveillance des actifs et des réseaux industriels, a annoncé mardi le lancement de son ... amélioré ...
>EmberOT, a provider of industrial asset and network monitoring solutions, announced on Tuesday the launch of its enhanced... ]]>
2024-07-10T11:03:44+00:00 https://industrialcyber.co/news/emberot-debuts-improved-ot-pcap-analyzer-tool-for-industrial-cybersecurity-sector/ www.secnews.physaphae.fr/article.php?IdArticle=8534181 False Tool,Industrial None 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) République de Chine du peuple (PRC) Ministère de sécurité d'État APT40 Tradecraft en action<br>People\\'s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action 2024-07-09T19:47:09+00:00 https://community.riskiq.com/article/e8378a00 www.secnews.physaphae.fr/article.php?IdArticle=8533748 False Malware,Tool,Vulnerability,Threat,Patching,Legislation,Industrial APT 40 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Construire une solide architecture de défense en profondeur pour la transformation numérique<br>Building a Robust Defense-in-Depth Architecture for Digital Transformation 2024-07-09T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/building-a-robust-defense-in-depth-architecture-for-digital-transformation www.secnews.physaphae.fr/article.php?IdArticle=8533615 False Ransomware,Malware,Tool,Vulnerability,Threat,Patching,Legislation,Mobile,Industrial None 2.0000000000000000 TechRepublic - Security News US Les bases de la cybersécurité industrielle peuvent aider à protéger les opérateurs de technologie opérationnelle APAC: Dragos<br>Industrial Cyber Security Basics Can Help Protect APAC Operational Technology Operators: Dragos Operational technology users face challenges including communication between process engineering and cyber security teams, a growth in malware and ransomware, and insiders making basic technology mistakes.]]> 2024-07-08T15:02:49+00:00 https://www.techrepublic.com/article/industrial-cyber-security-dragos-apac/ www.secnews.physaphae.fr/article.php?IdArticle=8532878 False Ransomware,Malware,Industrial None 3.0000000000000000 Dragos - CTI Society Ce que les fabricants doivent savoir sur le paysage OT Cyber ​​Threat<br>What Manufacturers Need to Know About the OT Cyber Threat Landscape Les environnements de fabrication deviennent de plus en plus des cibles pour les cyber-adversaires.La numérisation des processus de fabrication a brouillé les lignes entre elle ... Le post ce que les fabricants doivent savoir sur le paysage de l'OT Cyber ​​Threat sur dragos .
>Manufacturing environments are increasingly becoming targets for cyber adversaries. The digitalization of manufacturing processes has blurred the lines between IT... The post What Manufacturers Need to Know About the OT Cyber Threat Landscape first appeared on Dragos.]]>
2024-07-08T12:00:00+00:00 https://www.dragos.com/blog/ot-cyber-threat-landscape-manufacturing-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8532784 False Threat,Industrial None 3.0000000000000000
The State of Security - Magazine Américain Le GAO exhorte des mesures fédérales de cybersécurité plus fortes au milieu des menaces croissantes<br>GAO Urges Stronger Federal Cybersecurity Measures Amid Rising Threats The IT and OT systems that support not only federal governmental agencies but also national critical infrastructure must be protected, but developing a security strategy effective against threats is no easy feat. It can be difficult to cover all of the necessary areas, given that these systems are “complex and dynamic, technologically diverse, and often geographically dispersed,” according to a report from the United States Government Accountability Agency (GAO). The GAO report concerns the 2023 National Cybersecurity Strategy and its associated implementation plan, assessing the strategy...]]> 2024-07-08T02:59:42+00:00 https://www.tripwire.com/state-of-security/gao-urges-stronger-federal-cybersecurity-measures-amid-rising-threats www.secnews.physaphae.fr/article.php?IdArticle=8532648 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Besoin croissant de protéger les systèmes industriels avec des programmes de cybersécurité efficaces<br>Growing need to safeguard industrial systems with effective OT cybersecurity programs L'évolution des cyber-menaces et des attaques soulignent le besoin critique de programmes efficaces de cybersécurité OT pour protéger les systèmes industriels ...
>Evolving cyber threats and attacks underscore the critical need for effective OT cybersecurity programs to protect industrial systems... ]]>
2024-07-07T06:30:17+00:00 https://industrialcyber.co/features/growing-need-to-safeguard-industrial-systems-with-effective-ot-cybersecurity-programs/ www.secnews.physaphae.fr/article.php?IdArticle=8532090 False Industrial None 3.0000000000000000
SecurityWeek - Security News Dans d'autres nouvelles: Microsoft Détails Ics Flaws, Smart Grill Hacking, Predator Spyware Activity<br>In Other News: Microsoft Details ICS Flaws, Smart Grill Hacking, Predator Spyware Activity Des histoires remarquables qui pourraient avoir glissé sous le radar: Microsoft détaille les vulnérabilités Rockwell HMI, les grillades intelligentes piratées, l'activité spyware des prédateurs.
>Noteworthy stories that might have slipped under the radar: Microsoft details Rockwell HMI vulnerabilities, smart grills hacked, Predator spyware activity drops.  ]]>
2024-07-05T11:00:00+00:00 https://www.securityweek.com/in-other-news-microsoft-details-ics-flaws-smart-grill-hacking-predator-spyware-activity/ www.secnews.physaphae.fr/article.php?IdArticle=8531106 False Vulnerability,Industrial None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial Shift5, Booz Allen s'aligne pour améliorer l'observabilité de l'OT dans les secteurs du transport et de la défense<br>Shift5, Booz Allen align to enhance OT observability in transportation and defense sectors Shift5 et Booz Allen Hamilton ont annoncé un partenariat pour intégrer les capacités d'accès et d'observabilité à bord de Shift5 \\ ...
>Shift5 and Booz Allen Hamilton have announced a partnership to integrate Shift5\'s onboard data access and observability capabilities... ]]>
2024-07-03T13:19:34+00:00 https://industrialcyber.co/news/shift5-booz-allen-align-to-enhance-ot-observability-in-transportation-and-defense-sectors/ www.secnews.physaphae.fr/article.php?IdArticle=8529925 False Industrial None 3.0000000000000000
The State of Security - Magazine Américain Règlement sur la sécurité IoT: une liste de contrôle de conformité & # 8211;Partie 2<br>IoT Security Regulations: A Compliance Checklist – Part 2 In Part 1, the existing global regulations around IoT were introduced. In this part, the challenge of complying with these rules is examined. The IoT Security Challenge Securing the Internet of Things (IoT) presents complex challenges that stem primarily from the scale, heterogeneity, and distributed nature of IoT networks: Inconsistent security standards: One of the most pressing issues is the inconsistency of security features across different devices and manufacturers. Since IoT encompasses a wide range of device types-from simple sensors to sophisticated industrial machinery-the level of...]]> 2024-07-03T02:49:26+00:00 https://www.tripwire.com/state-of-security/iot-security-regulations-compliance-checklist-part-2 www.secnews.physaphae.fr/article.php?IdArticle=8529749 False Industrial None 2.0000000000000000 Dark Reading - Informationweek Branch Le bug de serveur de licences PTC a besoin de correctifs immédiats contre une faille critique<br>PTC License Server Bug Needs Immediate Patch Against Critical Flaw Creo Elements/Direct License Servers, which enable industrial design and modeling software, are exposed to the Internet, leaving critical infrastructure vulnerable to remote code execution.]]> 2024-07-02T18:42:49+00:00 https://www.darkreading.com/ics-ot-security/ptc-license-server-bug-needs-immediate-patch-against-critical-flaw www.secnews.physaphae.fr/article.php?IdArticle=8529519 False Industrial None 2.0000000000000000 Global Security Mag - Site de news francais Smart Cities et fortes affluences : protéger les réseaux face à l\'accroissement des cyberattaques Points de Vue]]> 2024-07-02T09:04:03+00:00 https://www.globalsecuritymag.fr/smart-cities-et-fortes-affluences-proteger-les-reseaux-face-a-l-accroissement.html www.secnews.physaphae.fr/article.php?IdArticle=8529412 False Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Dragos rapporte une augmentation des cyber-menaces dans la région nordique, les drapeaux vulnérabilité du secteur des énergies renouvelables<br>Dragos reports surge in cyber threats across Nordic region, flags vulnerability in renewable energy sector La société de cybersécurité industrielle Dragos a noté une augmentation significative des cyber-menaces dans les pays nordiques, notamment le Danemark, la Finlande, ...
>Industrial cybersecurity company Dragos noted a significant increase in cyber threats across the Nordic countries, including Denmark, Finland,... ]]>
2024-07-01T15:34:23+00:00 https://industrialcyber.co/reports/dragos-reports-surge-in-cyber-threats-across-nordic-region-flags-vulnerability-in-renewable-energy-sector/ www.secnews.physaphae.fr/article.php?IdArticle=8529280 False Vulnerability,Industrial None 4.0000000000000000
IndustrialCyber - cyber risk firms for industrial CyDome fournit un support productif pour les exigences unifiées IACS E26 Règlement<br>Cydome delivers productized support for IACS Unified Requirements E26 regulation La société de solutions de cybersécurité maritime Cydome a annoncé lundi la disponibilité générale de son support produit pour l'IACS Unified ...
>Maritime cybersecurity solutions company Cydome announced Monday the general availability of its product support for the IACS Unified... ]]>
2024-07-01T15:31:36+00:00 https://industrialcyber.co/news/cydome-delivers-productized-support-for-iacs-unified-requirements-e26-regulation/ www.secnews.physaphae.fr/article.php?IdArticle=8529281 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Meilleures pratiques de cybersécurité dans le secteur manufacturier<br>Cybersecurity Best Practices in the Manufacturing Sector Que se passe-t-il lorsqu'un analyste CISO, CTO et industrie entre dans un webinaire?Récemment, une conversation s'est déroulée dans ...
>What happens when a CISO, CTO, and industry analyst walk into a webinar? Recently, a conversation unfolded in... ]]>
2024-07-01T04:44:39+00:00 https://industrialcyber.co/manufacturing/cybersecurity-best-practices-in-the-manufacturing-sector/ www.secnews.physaphae.fr/article.php?IdArticle=8528950 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial ABI Research: OT Cybersecurity Market pour atteindre 21,6 milliards de dollars d'ici 2028 au milieu d'une défense industrielle accrue<br>ABI Research: OT cybersecurity market to reach $21.6 billion by 2028 amid increased industrial defense Les opérations industrielles sont de plus en plus menacées car le monde industriel embrasse les vagues de numérisation et de tendances de fabrication intelligentes ....
>Industrial operations are increasingly under threat as the industrial world embraces waves of digitization and smart manufacturing trends.... ]]>
2024-06-30T05:43:40+00:00 https://industrialcyber.co/news/abi-research-ot-cybersecurity-market-to-reach-21-6-billion-by-2028-amid-increased-industrial-defense/ www.secnews.physaphae.fr/article.php?IdArticle=8528311 False Threat,Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Vulnérabilités matérielles ICS trouvées dans Telsat, SDG Technologies, Yokogawa, Johnson Controls Equipment<br>ICS hardware vulnerabilities found in TELSAT, SDG Technologies, Yokogawa, Johnson Controls equipment L'Agence américaine de sécurité de la cybersécurité et de l'infrastructure (CISA) a publié jeudi sept avis ICS (systèmes de contrôle industriel) qui fournissent ...
>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published Thursday seven ICS (industrial control systems) advisories that provide... ]]>
2024-06-28T17:53:13+00:00 https://industrialcyber.co/cisa/ics-hardware-vulnerabilities-found-in-telsat-sdg-technologies-yokogawa-johnson-controls-equipment/ www.secnews.physaphae.fr/article.php?IdArticle=8527344 False Vulnerability,Industrial None 4.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les chercheurs mettent en garde contre les défauts des équipements d'analyse des gaz industriels largement utilisés<br>Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could be exploited by malicious actors to obtain sensitive information, induce a denial-of-service (DoS) condition, and even execute arbitrary commands. The flaws impact GC370XA, GC700XA, and GC1500XA and reside in versions 4.1.5 and prior. According to operational technology (OT) security firm Claroty, the]]> 2024-06-28T13:22:00+00:00 https://thehackernews.com/2024/06/researchers-warn-of-flaws-in-widely.html www.secnews.physaphae.fr/article.php?IdArticle=8527061 False Industrial,Industrial None 4.0000000000000000 Dragos - CTI Society Sous les Borealis: Intelligence de la cyber-menace adaptée aux pays nordiques<br>Under the Borealis: OT Cyber Threat Intelligence Tailored for Nordic Countries Les informations fournies ici proviennent de chasseurs d'adversaires et d'analystes de la cyber-menace de l'intelligence et des analystes qui effectuent des recherches sur l'adversaire ... Le post sous les Borealis: Intelligence de la cyber-menace adaptée aux pays nordiques Il est apparu pour la première fois sur dragos .
>Information provided here is sourced from Dragos OT Cyber Threat Intelligence adversary hunters and analysts who conduct research on adversary... The post Under the Borealis: OT Cyber Threat Intelligence Tailored for Nordic Countries  first appeared on Dragos.]]>
2024-06-28T07:00:00+00:00 https://www.dragos.com/blog/ot-cyber-threat-intelligence-nordic-renewable-energy/ www.secnews.physaphae.fr/article.php?IdArticle=8527032 False Threat,Industrial None 2.0000000000000000
Dragos - CTI Society La plate-forme Dragos gagne les scores les plus élevés pour la détection des menaces et des anomalies, la gestion de la vulnérabilité et la sécurité des produits dans la nouvelle vague de sécurité Forrester OT<br>Dragos Platform Earns Highest Scores for Threat and Anomaly Detection, Vulnerability Management, and Product Security in New Forrester OT Security Wave The Forrester Wavetm: Operational Technology Security Solutions, Q2 2024, a publié avec Dragos nommé un artiste fort et le seul ... Le post La plateforme Dragos gagne les scores les plus élevés pour la menace pour la menace pouret la détection des anomalies, la gestion de la vulnérabilité et la sécurité des produits dans la nouvelle vague de sécurité Forrester OT est apparue pour la première fois sur dragos .
>The Forrester WaveTM: Operational Technology Security Solutions, Q2 2024, has published with Dragos named a Strong Performer and the only... The post Dragos Platform Earns Highest Scores for Threat and Anomaly Detection, Vulnerability Management, and Product Security in New Forrester OT Security Wave first appeared on Dragos.]]>
2024-06-27T15:25:50+00:00 https://www.dragos.com/blog/industry-news/dragos-platform-earns-high-scores-forrester-ot-security-wave/ www.secnews.physaphae.fr/article.php?IdArticle=8526635 False Vulnerability,Threat,Industrial None 3.0000000000000000
Mandiant - Blog Sécu de Mandiant Le renouveau mondial du hacktivisme nécessite une vigilance accrue des défenseurs<br>Global Revival of Hacktivism Requires Increased Vigilance from Defenders   Since early 2022, Mandiant has observed the revival and intensification of threat activity from actors leveraging hacktivist tactics and techniques. This comes decades after hacktivism first emerged as a form of online activism and several years since many defenders last considered hacktivism to be a serious threat. However, this new generation of hacktivism has grown to encompass a more complex and often impactful fusion of tactics different actors leverage for their specific objectives. Today\'s hacktivists exhibit increased capabilities in both intrusion and information operations demonstrated by a range of activities such as executing massive disruptive attacks, compromising networks to leak information, conducting information operations, and even tampering with physical world processes. They have leveraged their skills to gain notoriety and reputation, promote political ideologies, and actively support the strategic interests of nation-states. The anonymity provided by hacktivist personas coupled with the range of objectives supported by hacktivist tactics have made them a top choice for both state and non-state actors seeking to exert influence through the cyber domain. This blog post presents Mandiant\'s analysis of the hacktivism threat landscape, and provides analytical tools to understand and assess the level of risk posed by these groups. Based on years of experience tracking hacktivist actors, their claims, and attacks, our insight is meant to help organizations understand and prioritize meaningful threat activity against their own networks and equities. Sample of imagery used by hacktivists to promote their threat activity Figure 1: Sample of imagery used by hacktivists to promote their threat activity Proactive Monitoring of Hacktivist Threats Necessary for Defenders to Anticipate Cyberattacks Mandiant considers activity to be hacktivism when actors claim to or conduct attacks with the publicly stated intent of engaging in political or social activism. The large scale of hacktivism\'s resurgence presents a critical challenge to defenders who need to proactively sift through the noise and assess the risk posed by a multitude of actors with ranging degrees of sophistication. While in many cases hacktivist activity represents a marginal threat, in the most significant hacktivist operations Mandiant has tracked, threat actors have deliberately layered multiple tactics in hybrid operations in such a way that the effect of each component magnified the others. In some cases, hacktivist tactics have been deliberately employed by nation-state actors to support hybrid operations that can seriously harm victims. As the volume and complexity of activity grows and new actors leverage hacktivist tactics, defenders must determine how to filter, assess, and neutralize a range of novel and evolving threats. The proactive moni]]> 2024-06-27T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/global-revival-of-hacktivism/ www.secnews.physaphae.fr/article.php?IdArticle=8526607 False Malware,Tool,Threat,Legislation,Industrial,Cloud,Commercial APT 38 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Radiflow, Garland s'aligne pour améliorer la détection des anomalies en temps réel dans les environnements OT<br>Radiflow, Garland align to enhance real-time anomaly detection in OT environments En réponse à l'augmentation des menaces contre les infrastructures critiques, Radiflow s'est associé à Garland Technology, un fournisseur d'évolution ...
>In response to rising threats against critical infrastructure, Radiflow has partnered with Garland Technology, a vendor of scalable... ]]>
2024-06-27T06:25:26+00:00 https://industrialcyber.co/news/radiflow-garland-align-to-enhance-real-time-anomaly-detection-in-ot-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8526393 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Temple de la renommée & # 8211;Chercheur de cybersécurité industrielle Joe Marshall<br>Hall of Fame – Industrial Cybersecurity Researcher Joe Marshall Dans notre série en cours du Temple de la renommée, Industrial Cyber ​​est fier de présenter Joe Marshall, une cybersécurité proéminente ...
>In our ongoing Hall of Fame series, Industrial Cyber is proud to present Joe Marshall, a prominent cybersecurity... ]]>
2024-06-27T06:07:11+00:00 https://industrialcyber.co/hall-of-fame/hall-of-fame-industrial-cybersecurity-researcher-joe-marshall/ www.secnews.physaphae.fr/article.php?IdArticle=8526394 False Industrial None 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Les logiciels malveillants XCTDOOOR étant utilisés pour attaquer les entreprises nationales<br>Xctdoor malware being used to attack domestic companies #### Targeted Geolocations - Korea #### Targeted Industries - Defense Industrial Base - Critical Manufacturing ## Snapshot AhnLab Security Intelligence Center (ASEC) identified a recent attack targeting Korean companies using the Xctdoor malware. The attackers initially infiltrated systems by targeting the update server of a specific Korean enterprise resource planning (ERP) company, affecting defense and manufacturing companies. ## Description In this attack, the threat actors targeted the update server of a specific ERP system to deploy the Xctdoor backdoor malware. This malware, developed in the Go language, uses the Regsvr32.exe process to execute DLL files and inject itself into system processes like taskhost.exe and explorer.exe. It achieves persistence by copying itself to a specific path and creating a shortcut in the startup folder. Xctdoor, once operational, communicates with a command and control (C&C) server using ]]> 2024-06-26T20:06:12+00:00 https://community.riskiq.com/article/df357951 www.secnews.physaphae.fr/article.php?IdArticle=8526193 False Malware,Vulnerability,Threat,Industrial None 3.0000000000000000 Global Security Mag - Site de news francais Tenable permet à West Burton Energy d\'améliorer la sécurité et l\'efficacité de ses activités OT Marchés]]> 2024-06-26T07:31:22+00:00 https://www.globalsecuritymag.fr/tenable-permet-a-west-burton-energy-d-ameliorer-la-securite-et-l-efficacite-de.html www.secnews.physaphae.fr/article.php?IdArticle=8525824 False Threat,Industrial None 3.0000000000000000 The State of Security - Magazine Américain Gagner la transparence du réseau avec la découverte et la conformité des actifs pour IT / OT<br>Gaining Network Transparency with Asset Discovery and Compliance for IT/OT I recently came across the " Johari Window Model" and thought this would be a good way to gain inspiration to explain the conundrum faced by many cybersecurity customers. The table below shows us the breakdown of the stages that are applicable not just to IT and OT environments but also to other facets of our daily lives. This model can be applied to asset discovery and Fortra\'s Security Configuration Management (SCM) system. There are situations when we lose insight into what our network asset inventory consists of. This is sometimes unintentional because, as busy individuals in the world of...]]> 2024-06-24T03:00:38+00:00 https://www.tripwire.com/state-of-security/gaining-network-transparency-asset-discovery-and-compliance-itot www.secnews.physaphae.fr/article.php?IdArticle=8524480 False Industrial None 2.0000000000000000 The State of Security - Magazine Américain Règlement sur la sécurité IoT: une liste de contrôle de conformité & # 8211;Partie 1<br>IoT Security Regulations: A Compliance Checklist – Part 1 The Internet of Things (IoT) refers to the global network of physical devices connected to the internet, capable of collecting and sharing data. IoT devices range from everyday household items to sophisticated industrial tools. By integrating sensors and communication hardware, IoT bridges the gap between the physical and digital worlds, enabling environments where smart devices operate interconnectedly and autonomously. IoT\'s growth is driven by the increasing availability of affordable computing power and connectivity, advances in data analytics and artificial intelligence, and the cost...]]> 2024-06-24T03:00:36+00:00 https://www.tripwire.com/state-of-security/iot-security-regulations-compliance-checklist-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8524481 False Tool,Industrial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Analyse du rôle des cadres de niveau C, gestion dans l'amélioration de la cybersécurité dans les secteurs industriels<br>Analyzing role of C-Level executives, management in enhancing cybersecurity within industrial sectors La sécurisation de l'adhésion au niveau C devient de plus en plus crucial pour la mise en œuvre de mesures de cybersécurité dans des environnements industriels et opérationnels.Support de ...
>Securing C-Level buy-in is becoming increasingly crucial for implementing cybersecurity measures across industrial and operational environments. Support from... ]]>
2024-06-23T08:29:30+00:00 https://industrialcyber.co/features/analyzing-role-of-c-level-executives-management-in-enhancing-cybersecurity-within-industrial-sectors/ www.secnews.physaphae.fr/article.php?IdArticle=8523918 False Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Le secrétaire du DHS, Mayorkas, dévoile les conseils stratégiques pour renforcer la sécurité et la résilience des infrastructures critiques<br>DHS Secretary Mayorkas unveils strategic guidance to bolster US critical infrastructure security and resilience U.S. Secretary of Homeland Security Alejandro N. Mayorkas has released strategic guidance to bolster critical infrastructure security and... ]]> 2024-06-21T18:52:00+00:00 https://industrialcyber.co/critical-infrastructure/dhs-secretary-mayorkas-unveils-strategic-guidance-to-bolster-us-critical-infrastructure-security-and-resilience/ www.secnews.physaphae.fr/article.php?IdArticle=8523252 False Industrial None 3.0000000000000000 Dragos - CTI Society Qu'est-ce que l'intelligence OT Cyber ​​Threat?<br>What Is OT Cyber Threat Intelligence? Dragos est une entreprise de cybersécurité industrielle tirant parti des logiciels, des renseignements et des services professionnels pour protéger la civilisation.Le SANS Institute rend la cybersécurité ... Le post Qu'est-ce que l'OT Cyber ​​Threat Intelligence? = "https://www.dragos.com"> dragos .
>Dragos is an industrial cybersecurity company leveraging software, intelligence, and professional services to safeguard civilization. The SANS Institute empowers cybersecurity... The post What Is OT Cyber Threat Intelligence? first appeared on Dragos.]]>
2024-06-20T21:55:34+00:00 https://www.dragos.com/blog/what-is-ot-cyber-threat-intelligence/ www.secnews.physaphae.fr/article.php?IdArticle=8522197 False Threat,Industrial None 3.0000000000000000
IndustrialCyber - cyber risk firms for industrial Mitre lance de l'acide pour augmenter la sécurité des OT avec des indicateurs basés sur ATT & CK utilisant les analyseurs ICSNPP de CISA \\<br>MITRE launches ACID to boost OT security with ATT&CK-based indicators using CISA\\'s ICSNPP Parsers MITRE has introduced ACID (ATT&CK-based Control-system Indicator Detection for Zeek), a compilation of OT (operational technology) protocol indicators.... ]]> 2024-06-20T18:16:30+00:00 https://industrialcyber.co/industrial-cyber-attacks/mitre-launches-acid-to-boost-ot-security-with-attck-based-indicators-using-cisas-icsnpp-parsers/ www.secnews.physaphae.fr/article.php?IdArticle=8522093 False Industrial None 4.0000000000000000 IndustrialCyber - cyber risk firms for industrial Fortinet rapporte une augmentation des cyberattaques du système OT avec des compromis de phishing et de courrier électronique conduisant à des intrusions<br>Fortinet reports surge in OT system cyberattacks with phishing and email compromises leading to intrusions New Fortinet research disclosed that cyberattacks that compromise OT (operational technology) systems are on the rise, as organizations... ]]> 2024-06-20T16:09:37+00:00 https://industrialcyber.co/reports/fortinet-reports-surge-in-ot-system-cyberattacks-with-phishing-and-email-compromises-leading-to-intrusions/ www.secnews.physaphae.fr/article.php?IdArticle=8521982 False Industrial None 4.0000000000000000 Global Security Mag - Site de news francais Cybersécurité augmentée pour l\'industrie : SystemX lance le programme emblématique de R&D Cybelia Business]]> 2024-06-20T12:42:29+00:00 https://www.globalsecuritymag.fr/cybersecurite-augmentee-pour-l-industrie-systemx-lance-le-programme.html www.secnews.physaphae.fr/article.php?IdArticle=8521874 False Industrial None 2.0000000000000000 IndustrialCyber - cyber risk firms for industrial La CISA prévient la vulnérabilité de traversée de chemin dans le matériel SECFlow-2 de Data \\<br>CISA warns of path traversal vulnerability in RAD Data\\'s SecFlow-2 hardware The U.S Cybersecurity and Infrastructure Security Agency (CISA) published Tuesday an ICS (industrial control systems) advisory with timely... ]]> 2024-06-20T09:07:04+00:00 https://industrialcyber.co/industrial-cyber-attacks/cisa-warns-of-path-traversal-vulnerability-in-rad-datas-secflow-2-hardware/ www.secnews.physaphae.fr/article.php?IdArticle=8521726 False Vulnerability,Industrial None 3.0000000000000000 Dragos - CTI Society The Hunt: Décodage du comportement humain dans la chasse aux menaces<br>The Hunt: Decoding Human Behavior in OT Threat Hunting Les erreurs sont humaines.Nous les minimitons.Nous les excusons comme si nous étions une bonne exception à la règle.Notre ... Le post la chasse: décodage du comportement humain dans la chasse aux menaces est apparu pour la première fois sur dragos .
>Mistakes are human. We downplay them. We excuse them as if we are a worthy exception to the rule. Our... The post The Hunt: Decoding Human Behavior in OT Threat Hunting first appeared on Dragos.]]>
2024-06-19T19:13:51+00:00 https://www.dragos.com/blog/the-hunt-decoding-human-behavior-in-ot-threat-hunting/ www.secnews.physaphae.fr/article.php?IdArticle=8521342 False Threat,Industrial None 3.0000000000000000