www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-17T18:00:57+00:00 www.secnews.physaphae.fr IndustrialCyber - cyber risk firms for industrial Le NCSC australien coordonne la réponse à la violation des ransomwares d'information sur la santé<br>Australian NCSC coordinates response to major health information ransomware breach Le coordinateur national australien de la cybersécurité (NCSC) a révélé qu'une organisation d'information sur la santé commerciale avait déclaré être le ...
>The Australian National Cyber Security Coordinator (NCSC) revealed that a commercial health information organization had reported being the... ]]>
2024-05-16T17:17:29+00:00 https://industrialcyber.co/medical/australian-ncsc-coordinates-response-to-major-health-information-ransomware-breach/ www.secnews.physaphae.fr/article.php?IdArticle=8501097 False Ransomware,Commercial None 2.0000000000000000
Korben - Bloger francais VMware Workstation et Fusion passent en gratuits pour les usages personnels ! 2024-05-14T16:16:31+00:00 https://korben.info/vmware-workstation-fusion-gratuits-usage-personnel.html www.secnews.physaphae.fr/article.php?IdArticle=8499713 False Commercial None 2.0000000000000000 Fortinet - Fabricant Materiel Securite Fortinet a nommé un challenger au 2024 Gartner & Reg;Magic Quadrant ™ pour les informations de sécurité et la gestion des événements<br>Fortinet Named a Challenger in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management Fortinet has been named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management. Learn more.]]> 2024-05-13T15:00:00+00:00 https://www.fortinet.com/blog/business-and-technology/fortinet-named-challenger-in-2024-gartner-magic-quadrant-for-security-information-event-management www.secnews.physaphae.fr/article.php?IdArticle=8498979 False Commercial None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Top Spy Official publie des principes sur les agences Intel Utilisation des informations achetées auprès des courtiers de données<br>Top spy official releases principles on intel agency use of info bought from data brokers Mais il ne redevient d'un point très clé, dit un législateur qui a fortement examiné l'achat d'agence d'espion des données commerciales en vrac.
>But it falls short on a very key point, says a lawmaker who has been heavily scrutinizing spy agency purchase of commercial bulk data. ]]>
2024-05-08T19:41:59+00:00 https://cyberscoop.com/top-spy-official-releases-principles-on-intel-agency-use-of-info-bought-from-data-brokers/ www.secnews.physaphae.fr/article.php?IdArticle=8496099 False Commercial None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Rapport de l'ONCD: \\ 'Transformation fondamentale \\' Dans Cyber, Tech a conduit 2023 Risques<br>ONCD report: \\'Fundamental transformation\\' in cyber, tech drove 2023 risks Les risques d'infrastructure critique en évolution, les ransomwares, l'exploitation de la chaîne d'approvisionnement, les logiciels espions commerciaux et l'IA étaient les principales tendances, a rapporté le bureau.
>Evolving critical infrastructure risks, ransomware, supply chain exploitation, commercial spyware and AI were the top trends, the office reported. ]]>
2024-05-07T16:02:27+00:00 https://cyberscoop.com/oncd-report-fundamental-transformation-in-cyber-tech-drove-2023-risks/ www.secnews.physaphae.fr/article.php?IdArticle=8495308 False Ransomware,Commercial None 2.0000000000000000
Silicon - Site de News Francais SSE : l\'expérience se simplifie plus que les prix 2024-05-03T08:47:36+00:00 https://www.silicon.fr/magic-quadrant-sse-2024-478321.html www.secnews.physaphae.fr/article.php?IdArticle=8492866 False Commercial None 2.0000000000000000 Amensty International - International Orgs Global: un réseau de surveillance & # 8211;Déstaurer un réseau trouble d'exportations de logiciels espions vers l'Indonésie<br>Global: A Web of Surveillance – Unravelling a murky network of spyware exports to Indonesia Une vaste gamme de logiciels espions et de produits de surveillance hautement invasifs est importé et déployé en Indonésie, a déclaré aujourd'hui le laboratoire de sécurité d'Amnesty International, alors qu'il publiait un nouveau briefing en collaboration avec les partenaires médiatiques & # 8211;Haaretz, Inside Story, Tempo, Wav Research Collective et Woz. & # 160; & # 160;Grâce à l'intelligence open source, y compris les bases de données commerciales commerciales et la cartographie des infrastructures de logiciels espions, [& # 8230;]
>An expansive range of highly invasive spyware and surveillance products are being imported and deployed in Indonesia, Amnesty International\'s Security Lab said today as it released a new briefing in collaboration with media partners – Haaretz, Inside Story, Tempo, WAV research collective and Woz.   Through open-source intelligence, including commercial trade databases and spyware infrastructure mapping, […] ]]>
2024-05-01T23:00:00+00:00 https://securitylab.amnesty.org/latest/2024/05/global-a-web-of-surveillance-unravelling-a-murky-network-of-spyware-exports-to-indonesia/ www.secnews.physaphae.fr/article.php?IdArticle=8492073 False Commercial None 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Muddywater Campaign abuse d'agents Atera<br>MuddyWater Campaign Abusing Atera Agents 2024-05-01T19:01:06+00:00 https://community.riskiq.com/article/9a596ba8 www.secnews.physaphae.fr/article.php?IdArticle=8492017 False Malware,Tool,Threat,Medical,Commercial None 3.0000000000000000 Recorded Future - FLux Recorded Future Les pays de la Baltique blâment la Russie pour le brouillage GPS des vols commerciaux<br>Baltic countries blame Russia for GPS jamming of commercial flights 2024-04-30T12:51:30+00:00 https://therecord.media/baltic-countries-blame-russia-gps-jamming-airline-flights www.secnews.physaphae.fr/article.php?IdArticle=8491249 False Commercial None 3.0000000000000000 CrowdStrike - CTI Society CrowdStrike nommé le premier rapport du leader dans l'industrie \\ de l'INDUST<br>CrowdStrike Named Overall Leader in Industry\\'s First ITDR Comparative Report The industry\'s first identity detection and response (ITDR) analyst report names CrowdStrike an Overall Leader and a “cyber industry force.” In KuppingerCole Leadership Compass, Identity Threat Detection and Response (ITDR) 2024: IAM Meets the SOC, CrowdStrike was named a Leader in every category - Product, Innovation, Market and Overall Ranking - and positioned the highest […]]]> 2024-04-30T09:10:30+00:00 https://www.crowdstrike.com/blog/overall-leader-itdr-comparative-report/ www.secnews.physaphae.fr/article.php?IdArticle=8493046 False Threat,Commercial None 3.0000000000000000 Dark Reading - Informationweek Branch OKTA: Attaques de compensation des pouvoirs Spike via des réseaux proxy<br>Okta: Credential-Stuffing Attacks Spike via Proxy Networks Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.]]> 2024-04-29T20:25:57+00:00 https://www.darkreading.com/vulnerabilities-threats/okta-credential-stuffing-attacks-spike-via-proxy-networks www.secnews.physaphae.fr/article.php?IdArticle=8490856 False Commercial None 3.0000000000000000 CrowdStrike - CTI Society CrowdStrike a nommé un leader dans IDC Marketscape pour MDR dans le monde entier<br>CrowdStrike Named a Leader in IDC MarketScape for Worldwide MDR The #1 global managed detection and response (MDR) provider and pioneer continues to dominate. Today, CrowdStrike was named a Leader in the 2024 IDC MarketScape: Worldwide Managed Detection and Response 2024 Vendor Assessment1 among the 19 vendors evaluated in the report.  CrowdStrike was also recently named a Leader in Frost & Sullivan\'s 2024 Frost Radar: […]]]> 2024-04-29T18:31:13+00:00 https://www.crowdstrike.com/blog/leader-idc-marketscape-worldwide-mdr/ www.secnews.physaphae.fr/article.php?IdArticle=8493047 False Commercial None 2.0000000000000000 Recorded Future - FLux Recorded Future Les règles de surveillance commerciale de la FTC pourraient arriver en quelques mois, disent des sources<br>FTC commercial surveillance rules could arrive within months, sources say 2024-04-23T17:40:11+00:00 https://therecord.media/ftc-commercial-surveillance-regulations-data-security-privacy-minimization www.secnews.physaphae.fr/article.php?IdArticle=8487536 False Commercial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les États-Unis impose des restrictions de visa sur 13 liés à une mauvaise utilisation des logiciels espions commerciaux<br>U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse The U.S. Department of State on Monday said it\'s taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. "These individuals have facilitated or derived financial benefit from the misuse of this technology, which]]> 2024-04-23T12:13:00+00:00 https://thehackernews.com/2024/04/us-imposes-visa-restrictions-on-13.html www.secnews.physaphae.fr/article.php?IdArticle=8487256 False Commercial None 3.0000000000000000 Palo Alto Network - Site Constructeur Palo Alto Networks reconnus par Gartner comme un leader dans le rapport SSE<br>Palo Alto Networks Recognized by Gartner as a Leader in SSE Report Palo Alto Networks est fier d'annoncer qu'il a été nommé leader dans le Gartner & Reg;Magic Quadrant ™ pour le service de service de sécurité (SSE).
>Palo Alto Networks is proud to announce that it has been named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge (SSE). ]]>
2024-04-18T15:18:41+00:00 https://www.paloaltonetworks.com/blog/2024/04/gartner-leader-in-sse-report/ www.secnews.physaphae.fr/article.php?IdArticle=8484807 False Commercial None 2.0000000000000000
Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Edge du service de sécurité NetSkope: encore une fois le plus élevé en exécution, le plus éloigné de la vision!<br>Netskope Security Service Edge: Once Again Highest in Execution, Furthest in Vision! Aujourd'hui, nous sommes ravis d'annoncer que Netskope a de nouveau été nommé leader dans le Gartner & Reg;Magic Quadrant ™ & # 160;pour le service de sécurité (SSE).C'est la troisième fois dans une rangée que Netskope est reconnue comme un leader et nous sommes reconnus comme un leader à chaque fois depuis le premier quadrant magique pour [& # 8230;]
>Today we are excited to announce that Netskope has once again been named a Leader in the Gartner® Magic Quadrant™  for Security Service Edge (SSE). This is the third time in a row Netskope has been recognized as a Leader-and we have been recognized as a Leader every time since the inaugural Magic Quadrant for […] ]]>
2024-04-18T15:08:13+00:00 https://www.netskope.com/blog/netskope-security-service-edge-once-again-highest-in-execution-furthest-in-vision www.secnews.physaphae.fr/article.php?IdArticle=8484806 False Commercial None 2.0000000000000000
Silicon - Site de News Francais Infrastructures LAN : une photo du marché avant la fusion HPE-Juniper 2024-04-17T14:51:01+00:00 https://www.silicon.fr/magic-quadrant-infrastructures-reseau-2024-477871.html www.secnews.physaphae.fr/article.php?IdArticle=8484181 False Commercial None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Introduction à l'analyse de la composition logicielle et comment sélectionner un outil SCA<br>Introduction to Software Composition Analysis and How to Select an SCA Tool Apache Log4j library vulnerability, which posed serious security risks. And this is not an isolated incident. Using open-source software necessitates thorough Software Composition Analysis (SCA) to identify these security threats. Organizations must integrate SCA tools into their development workflows while also being mindful of their limitations. Why SCA Is Important Open-source components have become crucial to software development across various industries. They are fundamental to the construction of modern applications, with estimates suggesting that up to 96% of the total code bases contain open-source elements. Assembling applications from diverse open-source blocks presents a challenge, necessitating robust protection strategies to manage and mitigate risks effectively. Software Composition Analysis is the process of identifying and verifying the security of components within software, especially open-source ones. It enables development teams to efficiently track, analyze, and manage any open-source element integrated into their projects. SCA tools identify all related components, including libraries and their direct and indirect dependencies. They also detect software licenses, outdated dependencies, vulnerabilities, and potential exploits. Through scanning, SCA creates a comprehensive inventory of a project\'s software assets, offering a full view of the software composition for better security and compliance management. Although SCA tools have been available for quite some time, the recent open-source usage surge has cemented their importance in application security. Modern software development methodologies, such as DevSecOps, emphasize the need for SCA solutions for developers. The role of security officers is to guide and assist developers in maintaining security across the Software Development Life Cycle (SDLC), ensuring that SCA becomes an integral part of creating secure software. Objectives and Tasks of SCA Tools Software Composition Analysis broadly refers to security methodologies and tools designed to scan applications, typically during development, to identify vulnerabilities and software license issues. For effective management of open-source components and associated risks, SCA solutions help navigate several tasks: 1) Increasing Transparency A developer might incorporate various open-source packages into their code, which in turn may depend on additional open-source packages unknown to the developer. These indirect dependencies can extend several levels deep, complicating the understanding of exactly which open-source code the application uses. Reports indicate that 86% of vulnerabilities in node.js projects stem from transitive (indirect) dependencies, w]]> 2024-04-17T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/introduction-to-software-composition-analysis-and-how-to-select-an-sca-tool www.secnews.physaphae.fr/article.php?IdArticle=8484209 False Tool,Vulnerability,Threat,Patching,Prediction,Cloud,Commercial None 2.0000000000000000 ProofPoint - Cyber Firms Comment la protection d'identification de la preuve peut vous aider à répondre aux exigences de conformité CMMC<br>How Proofpoint Impersonation Protection Can Help You Meet CMMC Compliance Requirements 2024-04-15T06:00:31+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/safeguard-business-with-impersonation-protection www.secnews.physaphae.fr/article.php?IdArticle=8482707 False Threat,Industrial,Prediction,Commercial None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Apple étend le système d'alerte spyware pour avertir les utilisateurs des attaques de mercenaires<br>Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are used by state actors to pull off "individually targeted]]> 2024-04-11T12:14:00+00:00 https://thehackernews.com/2024/04/apple-expands-spyware-alert-system-to.html www.secnews.physaphae.fr/article.php?IdArticle=8479812 False Tool,Threat,Commercial None 4.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Threat Actors Hack YouTube Channels to Distribute Infostealers (Vidar and LummaC2) ## Snapshot The AhnLab Security Intelligence Center (ASEC) has identified a concerning trend where threat actors are exploiting YouTube channels to distribute Infostealers, specifically Vidar and LummaC2. ## Description Rather than creating new channels, the attackers are hijacking existing, popular channels with hundreds of thousands of subscribers. The malware is disguised as cracked versions of legitimate software, and the attackers use YouTube\'s video descriptions and comments to distribute the malicious links. The Vidar malware, for example, is disguised as an installer for Adobe software, and it communicates with its command and control (C&C) server via Telegram and Steam Community. Similarly, LummaC2 is distributed under the guise of cracked commercial software and is designed to steal account credentials and cryptocurrency wallet files.  The threat actors\' method of infiltrating well-known YouTube channels with a large subscriber base raises concerns about the potential reach and impact of the distributed malware. The disguised malware is often compressed with password protection to evade detection by security solutions. It is crucial for users to exercise caution when downloading software from unofficial sources and to ensure that their security software is up to date to prevent malware infections. ## References [https://asec.ahnlab.com/en/63980/](https://asec.ahnlab.com/en/63980/)]]> 2024-04-09T19:48:57+00:00 https://community.riskiq.com/article/e9f5e219 www.secnews.physaphae.fr/article.php?IdArticle=8478894 False Malware,Hack,Threat,Prediction,Commercial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Mispadu Trojan cible l'Europe, des milliers d'identification compromises<br>Mispadu Trojan Targets Europe, Thousands of Credentials Compromised The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities spanning finance, services, motor vehicle manufacturing, law firms, and commercial facilities, according to Morphisec. "Despite the geographic expansion, Mexico remains the]]> 2024-04-03T15:02:00+00:00 https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html www.secnews.physaphae.fr/article.php?IdArticle=8475127 False Commercial None 2.0000000000000000 Silicon - Site de News Francais Data quality : faut-il être plus exigeant à l\'aune de l\'IA ? 2024-04-02T15:54:32+00:00 https://www.silicon.fr/data-quality-magic-quadrant-2024-477370.html www.secnews.physaphae.fr/article.php?IdArticle=8474692 False Commercial None 3.0000000000000000 ProofPoint - Cyber Firms ProofPoint en tête de KuppingerCole Leadership Compass pour la sécurité des e-mails<br>Proofpoint Tops KuppingerCole Leadership Compass for Email Security 2024-04-02T09:34:09+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/proofpoint-leader-kuppingercole-leadership-compass-email-security www.secnews.physaphae.fr/article.php?IdArticle=8474609 False Data Breach,Malware,Threat,Mobile,Commercial None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Licence d'ingénieurs d'IA<br>Licensing AI Engineers Article du journal de droit Recommander la même idée pour les ingénieurs de l'IA. Cet article propose une autre manière: professionnalisation de l'ingénierie AI.Obliger les ingénieurs d'IA pour obtenir des licences pour construire des produits d'IA commerciaux, les pousser à collaborer sur des normes techniques spécifiques au domaine en faveur scientifique et en appuyant sur le domaine et en facilitant les services de police eux-mêmes.Cette proposition de cette article traite des préjudices de l'IA à leur création, influençant les décisions même d'ingénierie qui leur donnent naissance en premier lieu.En arrachant le contrôle des informations et de la conception du système aux entreprises et en les remettant aux ingénieurs de l'IA, la professionnalisation enget une IA digne de confiance par conception.Au-delà de la recommandation de la solution politique spécifique de la professionnalisation, cet article vise à éloigner le discours sur l'IA de l'accent mis sur les solutions légères et les solutions ex post qui traitent des produits déjà créés à un accent sur les contrôles ex ante qui précèdent le développement de l'IA.Nous avons déjà utilisé ce livre de jeu dans les domaines nécessitant un niveau d'expertise élevé où une obligation pour le bien-être public doit l'emporter sur les motivations commerciales.Et si, comme les médecins, les ingénieurs de l'IA ont également promis de ne pas faire de mal? ...
The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing requirement for software engineers.) Here’s a law journal article recommending the same idea for AI engineers. This Article proposes another way: professionalizing AI engineering. Require AI engineers to obtain licenses to build commercial AI products, push them to collaborate on scientifically-supported, domain-specific technical standards, and charge them with policing themselves. This Article’s proposal addresses AI harms at their inception, influencing the very engineering decisions that give rise to them in the first place. By wresting control over information and system design away from companies and handing it to AI engineers, professionalization engenders trustworthy AI by design. Beyond recommending the specific policy solution of professionalization, this Article seeks to shift the discourse on AI away from an emphasis on light-touch, ex post solutions that address already-created products to a greater focus on ex ante controls that precede AI development. We’ve used this playbook before in fields requiring a high level of expertise where a duty to the public welfare must trump business motivations. What if, like doctors, AI engineers also vowed to do no harm?...]]>
2024-03-25T11:04:34+00:00 https://www.schneier.com/blog/archives/2024/03/licensing-ai-engineers.html www.secnews.physaphae.fr/article.php?IdArticle=8470099 False Technical,Commercial None 3.0000000000000000
Korben - Bloger francais Sprite Fusion – Un éditeur de niveaux 2D pour vos jeux, utilisable directement dans le navigateur 2024-03-21T08:00:00+00:00 https://korben.info/outil-gratuit-sprite-fusion-conception-niveaux-2d-tilemap-unity-godot.html www.secnews.physaphae.fr/article.php?IdArticle=8467784 False Commercial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Des pirates utilisant du contrebandier HTML sournois pour livrer des logiciels malveillants via de faux sites Google<br>Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites Cybersecurity researchers have discovered a new malware campaign that leverages bogus Google Sites pages and HTML smuggling to distribute a commercial malware called AZORult in order to facilitate information theft. "It uses an unorthodox HTML smuggling technique where the malicious payload is embedded in a separate JSON file hosted on an external website," Netskope Threat Labs]]> 2024-03-18T18:05:00+00:00 https://thehackernews.com/2024/03/hackers-using-sneaky-html-smuggling-to.html www.secnews.physaphae.fr/article.php?IdArticle=8466033 False Malware,Threat,Commercial None 2.0000000000000000 Recorded Future - FLux Recorded Future Un combattant spyware de premier<br>A leading spyware combatant on what\\'s next as governments continue to crack down John Scott-Railton, chercheur principal du Citizen Lab, basé au Canada, est en première ligne du problème des logiciels espions depuis plus d'une décennie.L'organisation a notamment découvert des attaques tentaculaires en Pologne et en Espagne au cours des deux dernières années seulement.Pendant ce temps, les incidents de logiciels spy
John Scott-Railton, a senior researcher at Canada-based Citizen Lab, has been on the front lines of the spyware problem for more than a decade. The organization notably has uncovered sprawling attacks in Poland and Spain in just the last two years. Meanwhile, commercial spyware incidents have only grown in magnitude and frequency, a fact]]>
2024-03-18T16:15:26+00:00 https://therecord.media/commercial-spyware-john-scott-railton-interview-citizen-lab www.secnews.physaphae.fr/article.php?IdArticle=8466167 False Commercial None 2.0000000000000000
Recorded Future - FLux Recorded Future Finlande, Allemagne, Irlande, Japon, Pologne, Corée du Sud a ajouté à un accord de logiciel espion dirigé par les États-Unis<br>Finland, Germany, Ireland, Japan, Poland, South Korea added to US-led spyware agreement Six nouveaux pays ont rejoint un effort international pour contrer la prolifération et l'utilisation abusive des logiciels espions commerciaux.La Finlande, l'Allemagne, l'Irlande, le Japon, la Pologne et la Corée du Sud ont été ajoutées à une déclaration conjointe précédemment publiée des États-Unis et de 10 autres pays au sujet de la nécessité de réglementation et de garde-corps sur les logiciels espions. & NBSP;Les signataires acceptent d'établir
Six new countries have joined an international effort to counter the proliferation and misuse of commercial spyware. Finland, Germany, Ireland, Japan, Poland and South Korea were added to a previously released joint statement from the U.S. and 10 other countries about the need for regulation and guardrails on spyware.  The signees agree to establish]]>
2024-03-18T15:24:45+00:00 https://therecord.media/international-spyware-agreement-new-members www.secnews.physaphae.fr/article.php?IdArticle=8466135 False Commercial None 2.0000000000000000
Fortinet - Fabricant Materiel Securite Nous sommes un leader: 2024 Magic Quadrant ™ pour l'infrastructure LAN câblée et sans fil d'entreprise par Gartner & Reg;<br>We\\'re a Leader: 2024 Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure by Gartner® Fortinet has been named a Leader in the 2024 Gartner® Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure. Learn more.]]> 2024-03-14T18:30:53+00:00 https://www.fortinet.com/blog/business-and-technology/leader-for-magic-quadrant-for-enterprise-wired-and-wireless-lan-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=8463947 False Commercial None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Spyware commercial: la menace furtive<br>Commercial spyware: The stealthy threat https://www.scmagazine.com/news/spyware-behind-nearly-50-of-zeros-days-targeting-google-products). ]]> 2024-03-14T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/commercial-spyware-the-stealthy-threat www.secnews.physaphae.fr/article.php?IdArticle=8463833 False Ransomware,Malware,Tool,Vulnerability,Threat,Legislation,Mobile,Commercial None 2.0000000000000000 Zataz - Magazine Francais de secu Sanctions contre les acteurs du logiciel espion Predator 2024-03-13T15:47:43+00:00 https://www.zataz.com/sanctions-contre-les-acteurs-du-logiciel-espion-predator/ www.secnews.physaphae.fr/article.php?IdArticle=8463256 False Threat,Commercial None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Alerte: cybercriminels déploiement de vcurms et de chevaux de Troie de strat via AWS et Github<br>Alert: Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub A new phishing campaign has been observed delivering remote access trojans (RAT) such as VCURMS and STRRAT by means of a malicious Java-based downloader. “The attackers stored malware on public services like Amazon Web Services (AWS) and GitHub, employing a commercial protector to avoid detection of the malware,” Fortinet FortiGuard Labs researcher Yurren Wan said. An unusual aspect of the]]> 2024-03-13T15:13:00+00:00 https://thehackernews.com/2024/03/alert-cybercriminals-deploying-vcurms.html www.secnews.physaphae.fr/article.php?IdArticle=8463117 False Malware,Commercial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les États-Unis réchauffent une entreprise de spyware prédatrice pour cibler les fonctionnaires et les journalistes<br>U.S. Cracks Down on Predatory Spyware Firm for Targeting Officials and Journalists The U.S. Department of Treasury\'s Office of Foreign Assets Control (OFAC) sanctioned two individuals and five entities associated with the Intellexa Alliance for their role in “developing, operating, and distributing” commercial spyware designed to target government officials, journalists, and policy experts in the country. “The proliferation of commercial spyware poses distinct and growing]]> 2024-03-06T13:05:00+00:00 https://thehackernews.com/2024/03/us-cracks-down-on-predatory-spyware.html www.secnews.physaphae.fr/article.php?IdArticle=8459726 False Commercial None 3.0000000000000000 Dark Reading - Informationweek Branch Les opérateurs de logiciels espions prédateurs ont giflé avec les sanctions américaines<br>Predator Spyware Operators Slapped With US Sanctions The US Treasury Department sanctioned Intellexa Consortium commercial surveillance leaders in an effort to deter Predator proliferation.]]> 2024-03-05T23:05:35+00:00 https://www.darkreading.com/endpoint-security/global-commercial-spyware-operators-sanctioned-by-us www.secnews.physaphae.fr/article.php?IdArticle=8459538 False Commercial None 3.0000000000000000 Silicon - Site de News Francais iPaaS : la confusion règne ? 2024-03-05T17:30:06+00:00 https://www.silicon.fr/ipaas-magic-quadrant-2024-476521.html www.secnews.physaphae.fr/article.php?IdArticle=8459432 False Commercial None 2.0000000000000000 Recorded Future - FLux Recorded Future US Sanctions Predator Spyware Makers pour cibler les fonctionnaires de Gov \\ '<br>US sanctions Predator spyware makers for targeting gov\\'t officials Le gouvernement américain a annoncé mardi des sanctions contre deux personnes et cinq entités liées aux logiciels espions de Predator, quelques jours seulement après l'entreprise derrière l'outil a supprimé l'infrastructure en réponse à Nouvelles recherches sur ses opérations .Le département du Trésor a déclaré qu'il sanctionnait des personnes et des entités liées au consortium d'impression commerciale Intellexa - une tenue
The U.S. government announced sanctions on Tuesday against two people and five entities tied to Predator spyware, just days after the company behind the tool took down infrastructure in response to new research about its operations. The Treasury Department said it sanctioned people and entities connected to the Intellexa Commercial Spyware Consortium - a holding]]>
2024-03-05T15:58:00+00:00 https://therecord.media/predator-spyware-makers-sanctioned-for-targeting-government-officials www.secnews.physaphae.fr/article.php?IdArticle=8459384 False Tool,Legislation,Commercial None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Maker des sanctions américaines du logiciel espion prédateur<br>U.S. sanctions maker of Predator spyware L'administration Biden sanctionne les individus et les entités derrière l'outil de surveillance commerciale impliquée dans les violations des droits de l'homme.
>The Biden administration sanctions individuals and entities behind the commercial surveillance tool implicated in human rights abuses. ]]>
2024-03-05T15:30:00+00:00 https://cyberscoop.com/predator-intellexa-cytrox-sanctions/ www.secnews.physaphae.fr/article.php?IdArticle=8459383 False Tool,Commercial None 2.0000000000000000
Global Security Mag - Site de news francais Utimaco et InfoSec deviennent un partenaire mondial<br>Utimaco and InfoSec become Global Partner nouvelles commerciales
Utimaco and InfoSec Global Partner to Facilitate Post-Quantum Cryptography Readiness and Enable Commercial and Government Enterprises to Achieve Cryptographic Agility Partnership enables commercial and government enterprises to meet post-quantum computing (PQC) migration requirements while adopting best practices for key management, hardware security and cryptographic agility. - Business News]]>
2024-03-05T13:25:49+00:00 https://www.globalsecuritymag.fr/utimaco-and-infosec-become-global-partner.html www.secnews.physaphae.fr/article.php?IdArticle=8459336 False Commercial None 2.0000000000000000
Bleeping Computer - Magazine Américain US Sanctions Opérateurs d'espionnage des prédateurs pour l'espionnage des Américains<br>U.S. sanctions Predator spyware operators for spying on Americans The U.S. has imposed sanctions on two individuals and five entities linked to the development and distribution of the Predator commercial spyware used to target Americans, including government officials and journalists. [...]]]> 2024-03-05T13:09:37+00:00 https://www.bleepingcomputer.com/news/legal/us-sanctions-predator-spyware-operators-for-spying-on-americans/ www.secnews.physaphae.fr/article.php?IdArticle=8459454 False Commercial None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial Xage, partenaire DarkTrace pour stimuler la protection Zero Trust pour les environnements d'infrastructure critique commerciale<br>Xage, Darktrace partner to boost zero trust protection for commercial critical infrastructure environments Cybersecurity AI company Darktrace and Xage Security announced Monday a new partnership to help businesses prevent cyberattacks and... ]]> 2024-03-05T12:49:59+00:00 https://industrialcyber.co/news/xage-darktrace-partner-to-boost-zero-trust-protection-for-commercial-critical-infrastructure-environments/ www.secnews.physaphae.fr/article.php?IdArticle=8459302 False Commercial None 2.0000000000000000 Global Security Mag - Site de news francais Sécurité Xage et partenaire DarkTrace<br>Xage Security and Darktrace Partner nouvelles commerciales
Xage Security and Darktrace Partner to Enhance Zero Trust Protection for Commercial Critical Infrastructure Environments New integration between Darktrace/OT and Xage Fabric Platform makes it easy to detect and respond to threats deep inside IT and OT systems - Business News]]>
2024-03-04T16:48:38+00:00 https://www.globalsecuritymag.fr/xage-security-and-darktrace-partner.html www.secnews.physaphae.fr/article.php?IdArticle=8459209 False Industrial,Commercial None 1.00000000000000000000
Recorded Future - FLux Recorded Future Les chercheurs repèrent une nouvelle infrastructure probablement utilisée pour les logiciels espions prédateurs<br>Researchers spot new infrastructure likely used for Predator spyware Les chercheurs en cybersécurité ont identifié de nouvelles infrastructures probablement utilisées par les opérateurs du logiciel espion commercial connu sous le nom de Predator dans au moins 11 pays.En analysant les domaines probablement utilisés pour livrer les logiciels espions, les analystes du groupe Insikt de Future \\ enregistré ont pu Potentiel ponctuelClients prédateurs En Angola, Arménie, Botswana, Égypte, Indonésie, Kazakhstan, Mongolie, Oman,
Cybersecurity researchers have identified new infrastructure likely used by the operators of the commercial spyware known as Predator in at least 11 countries. By analyzing the domains likely used to deliver the spyware, analysts at Recorded Future\'s Insikt Group were able to spot potential Predator customers in Angola, Armenia, Botswana, Egypt, Indonesia, Kazakhstan, Mongolia, Oman,]]>
2024-03-01T15:30:11+00:00 https://therecord.media/new-predator-spyware-infrastructure-identified www.secnews.physaphae.fr/article.php?IdArticle=8457576 False Commercial None 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine La plupart du code commercial contient des bogues open source à haut risque<br>Most Commercial Code Contains High-Risk Open Source Bugs Synopsys report reveals 74% of codebases now contain risky open source components]]> 2024-02-27T13:00:00+00:00 https://www.infosecurity-magazine.com/news/commercial-code-highrisk-open/ www.secnews.physaphae.fr/article.php?IdArticle=8455858 False Studies,Commercial None 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Nouvelles attaques de chargeur IDAT en utilisant la stéganographie pour déployer Remcos Rat<br>New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT Loader. The attack has been attributed to a threat actor tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) under the moniker UAC-0184. "The attack, as part of the IDAT Loader, used]]> 2024-02-26T20:24:00+00:00 https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html www.secnews.physaphae.fr/article.php?IdArticle=8455453 False Malware,Threat,Commercial None 2.0000000000000000 AhnLab - Korean Security Firm Ascroqueries en ligne: êtes-vous à l'abri des imitations, des menaces et des tromperies?<br>Online Scams: Are You Safe From Impersonations, Threats, and Deceptions? Nos vies sont connectées au monde numérique qui nous fournit de nombreux services publics et divertissements, mais parfois il se présentenous avec des rencontres indésirables.Les fraudes et escroqueries en ligne sont des exemples de telles rencontres.Les vagues d'e-mails de spam publicitaires commerciaux que nous recevons ne sont pas très dérangeants, mais les escroqueries en ligne sont plutôt très sérieuses.L'escroquerie en ligne est une cybercriminalité grave qui inflige des dommages à long terme financièrement et psychologiquement, et laisse d'énormes cicatrices aux victimes & # 8217;vies.Lorsque les entreprises sont affectées ...
Our lives are connected to the digital world that provides us with numerous utilities and entertainment, but sometimes it presents us with undesirable encounters. Online frauds and scams are examples of such encounters. Waves of commercial advertisement spam emails we receive are not much of a bother, but online scams are rather very serious. Online scamming is a serious cybercrime that inflicts long-term damage both financially and psychologically, and leaves tremendous scars on the victims’ lives. When companies are affected... ]]>
2024-02-23T02:02:05+00:00 https://asec.ahnlab.com/en/61976/ www.secnews.physaphae.fr/article.php?IdArticle=8453922 False Spam,Commercial None 2.0000000000000000
Recorded Future - FLux Recorded Future Des documents divulgués ouvrent le couvercle de l'industrie du piratage commercial de la Chine \\<br>Leaked documents open the lid on China\\'s commercial hacking industry Une mine de documents divulgués semblant provenir d'une entreprise de sécurité chinoise met en lumière l'industrie commerciale du cyberespionnage du pays - révélant des contrats de piratage avec des agences publiques, un référentiel d'objectifs et des années de discussion entre les employés.Alors que la source de la fuite est inconnue, les chercheurs connaissant la cyber industrie chinoise
A trove of leaked documents appearing to be from a Chinese security company is shedding light on the country\'s commercial cyberespionage industry - revealing hacking contracts with public agencies, a repository of targets and years of chats among employees. While the source of the leak is unknown, researchers with knowledge of the Chinese cyber industry]]>
2024-02-22T14:07:32+00:00 https://therecord.media/china-commercial-hacking-industry-isoon-leaks www.secnews.physaphae.fr/article.php?IdArticle=8453711 False Commercial None 2.0000000000000000
Krebs on Security - Chercheur Américain Une nouvelle fuite montre le côté commercial de la menace apte de la Chine<br>New Leak Shows Business Side of China\\'s APT Menace A new data leak that appears to have come from one of China\'s top private cybersecurity firms provides a rare glimpse into the commercial side of China\'s many state-sponsored hacking groups. Experts say the leak illustrates how Chinese government agencies increasingly are contracting out foreign espionage campaigns to the nation\'s burgeoning and highly competitive cybersecurity industry.]]> 2024-02-22T13:27:47+00:00 https://krebsonsecurity.com/2024/02/new-leak-shows-business-side-of-chinas-apt-menace/ www.secnews.physaphae.fr/article.php?IdArticle=8453683 False Commercial None 2.0000000000000000 The State of Security - Magazine Américain Construire la confiance des clients grâce à des pratiques de sécurité et de sécurité transparentes<br>Building Customer Trust through Transparent Safety and Security Practices Last year, the Securities and Exchange Commission adopted rules on cybersecurity risk management that focused on transparency. Much of the adopted rules were focused on investors, but the rules also underscored the importance of the impact to customers when cybersecurity incidents occur. The data security landscape has recently shifted to prioritize the user or the customer, and that was just one of the steps in furthering the approach. In many commercial relationships, customers have endured a fractious relationship with organizations, especially the so-called big tech firms, concerning data...]]> 2024-02-21T02:43:54+00:00 https://www.tripwire.com/state-of-security/building-customer-trust-through-transparent-safety-and-security-practices www.secnews.physaphae.fr/article.php?IdArticle=8453091 False Commercial None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant Dévoiler l'évaluation de l'échéance du programme d'intelligence de cyber-menace de Maniant<br>Unveiling Mandiant\\'s Cyber Threat Intelligence Program Maturity Assessment Discovery des capacités d'intelligence basées sur les web (ICD) pour aider les organisations commerciales et gouvernementales à évaluerLa maturité de leur programme d'intelligence cyber-menace (CTI).La CIM est conçue pour fournir aux praticiens de la cybersécurité et aux dirigeants du renseignement des menaces une estimation de la façon dont le programme CTI \\ de l'organisation crée un impact organisationnel positif et réduit le risque pour l'entreprise.La CIM joue un critique
As part of Google Cloud\'s continuing commitment to improving the overall state of cybersecurity for society, today Mandiant is publicly releasing a web-based Intelligence Capability Discovery (ICD) to help commercial and governmental organizations evaluate the maturity of their cyber threat intelligence (CTI) program. The ICD is designed to provide cyber security practitioners and threat intelligence leaders with an estimate of how effectively and efficiently the organization\'s CTI program is creating a positive organizational impact and reducing risk for the business. The ICD plays a critical]]>
2024-02-21T00:00:00+00:00 https://www.mandiant.com/resources/blog/cti-program-maturity-assessment www.secnews.physaphae.fr/article.php?IdArticle=8453012 False Threat,Cloud,Commercial None 3.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine Les avions israéliens survivent aux tentatives de «cyber-hijacking»<br>Israeli Aircraft Survive “Cyber-Hijacking” Attempts Hackers have attempted to divert two commercial Israeli aircraft in recent days, reports claim]]> 2024-02-19T10:15:00+00:00 https://www.infosecurity-magazine.com/news/israeli-aircraft-survive/ www.secnews.physaphae.fr/article.php?IdArticle=8452252 False Commercial None 2.0000000000000000 Global Security Mag - Site de news francais Aston Martin Aramco Formula One® Team pilote sa cybersécurité avec SentinelOne® Marchés]]> 2024-02-15T14:13:11+00:00 https://www.globalsecuritymag.fr/aston-martin-aramco-formula-one-r-team-pilote-sa-cybersecurite-avec-sentinelone.html www.secnews.physaphae.fr/article.php?IdArticle=8450451 True Commercial None 2.0000000000000000 Global Security Mag - Site de news francais Aston Martin Aramco Formule One & Reg;L'équipe entraîne la cybersécurité avec Sentinelone & Reg;<br>Aston Martin Aramco Formula One® Team drives cybersecurity with SentinelOne® actualités du marché
Aston Martin Aramco Formula One® Team drives cybersecurity with SentinelOne® Team extends collaboration with Official Cybersecurity Partner leveraging AI-powered solutions to run securely on and off track - Market News]]>
2024-02-15T10:01:05+00:00 https://www.globalsecuritymag.fr/aston-martin-aramco-formula-one-r-team-drives-cybersecurity-with-sentinelone-r.html www.secnews.physaphae.fr/article.php?IdArticle=8450345 False Commercial None 2.0000000000000000
TechRepublic - Security News US Recherche d'espionnage de Google \\'s Menace Analysis Group \\: comment les appareils et applications cibles CSVS<br>Google\\'s Threat Analysis Group\\'s Spyware Research: How CSVs Target Devices and Applications Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it.]]> 2024-02-14T18:39:21+00:00 https://www.techrepublic.com/article/google-threat-analysis-group-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8450103 False Threat,Commercial None 2.0000000000000000 Dark Reading - Informationweek Branch CSC s'associe à NetDilience pour aider à atténuer les cyber-risques<br>CSC Partners With NetDiligence to Help Mitigate Cyber Risks 2024-02-12T21:11:48+00:00 https://www.darkreading.com/cyber-risk/csc-partners-with-netdiligence-to-help-mitigate-cyber-risks www.secnews.physaphae.fr/article.php?IdArticle=8449388 False Commercial None 2.0000000000000000 Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Pourquoi les relations de regard sont essentielles pour fournir une expérience utilisateur phénoménale<br>Why Peering Relationships are Key to Providing a Phenomenal User Experience L'un des nombreux avantages de l'exécution de votre propre infrastructure de cloud privé est l'amélioration des performances lorsque vous contrôlez votre propre connectivité, raccourcissant le chemin et réduisant la latence pour les deux utilisateurs se connectant à votre cloud privé et à votre connectivité au premier mile aux applicationsEt services.L'alternative, et une utilisée par celles utilisant le public [& # 8230;]
>One of the many benefits of running your own private cloud infrastructure are the performance improvements when you\'re in control of your own connectivity, shortening the path and reducing latency for both users connecting to your private cloud and first mile connectivity to applications and services. The alternative, and one used by those utilizing public […] ]]>
2024-02-12T20:14:28+00:00 https://www.netskope.com/blog/why-peering-relationships-are-key-to-providing-a-phenomenal-user-experience www.secnews.physaphae.fr/article.php?IdArticle=8449370 False Cloud,Commercial None 2.0000000000000000
Dark Reading - Informationweek Branch BugCrowd sécurise 102 millions de dollars de financement de croissance stratégique pour mettre à l'échelle une plate-forme de sécurité crowdsourcée à AI<br>Bugcrowd Secures $102M in Strategic Growth Funding to Scale AI-Powered Crowdsourced Security Platform 2024-02-12T20:14:12+00:00 https://www.darkreading.com/vulnerabilities-threats/bugcrowd-secures-102-million-in-strategic-growth-funding-to-scale-ai-powered-crowdsourced-security-platform www.secnews.physaphae.fr/article.php?IdArticle=8449374 False Commercial None 2.0000000000000000 Techworm - News Les propriétaires d'iPhone ciblés par des pirates gouvernementaux, explique Google<br>iPhone Owners Targeted By Government Hackers, Says Google Google\'s Threat Analysis Group (TAG) on Tuesday revealed that government hackers ta]]> 2024-02-08T00:00:33+00:00 https://www.techworm.net/2024/02/iphone-owners-targeted-by-government-hackers-says-google.html www.secnews.physaphae.fr/article.php?IdArticle=8447764 False Tool,Vulnerability,Threat,Mobile,Commercial None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les gouvernements et les géants de la technologie s'unissent contre les logiciels espions commerciaux<br>Governments and Tech Giants Unite Against Commercial Spyware Over 25 governments and 14 tech companies vowed to fight against the proliferation of commercial spyware]]> 2024-02-07T17:45:00+00:00 https://www.infosecurity-magazine.com/news/governments-tech-giants-against/ www.secnews.physaphae.fr/article.php?IdArticle=8447739 False Commercial None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les géants mondiaux de la coalition et de la technologie s'unissent contre la maltraitance commerciale des logiciels espions<br>Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech companies such as Google, MDSec, Meta, and Microsoft, have signed a joint agreement to curb the abuse of commercial spyware to commit human rights abuses. The initiative, dubbed the Pall Mall Process, aims to tackle the proliferation and irresponsible use of commercial cyber intrusion tools by]]> 2024-02-07T15:15:00+00:00 https://thehackernews.com/2024/02/global-coalition-and-tech-giants-unite.html www.secnews.physaphae.fr/article.php?IdArticle=8447601 False Tool,Commercial None 2.0000000000000000 The Register - Site journalistique Anglais L'activité spyware est en plein essor malgré les répressions du gouvernement<br>The spyware business is booming despite government crackdowns \'Almost zero data being shared across the industry on this particular threat,\' we\'re told The commercial spyware economy – despite government and big tech\'s efforts to crack down – appears to be booming.…]]> 2024-02-07T08:31:05+00:00 https://go.theregister.com/feed/www.theregister.com/2024/02/07/spyware_business_booming/ www.secnews.physaphae.fr/article.php?IdArticle=8447567 False Threat,Commercial None 2.0000000000000000 Bleeping Computer - Magazine Américain Google dit que les fournisseurs de logiciels espions derrière la plupart des zéro-jours qu'il découvre<br>Google says spyware vendors behind most zero-days it discovers Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google\'s Threat Analysis Group (TAG) discovered in 2023 and used to spy on devices worldwide. [...]]]> 2024-02-06T12:27:54+00:00 https://www.bleepingcomputer.com/news/security/google-says-spyware-vendors-behind-most-zero-days-it-discovers/ www.secnews.physaphae.fr/article.php?IdArticle=8447360 False Vulnerability,Threat,Commercial None 4.0000000000000000 SecurityWeek - Security News Google relie plus de 60 jours zéro aux vendeurs de logiciels espions commerciaux<br>Google Links Over 60 Zero-Days to Commercial Spyware Vendors Plus de 60 des Adobe, Google, Android, Microsoft, Mozilla et Apple Zero-Days qui ont été révélés depuis 2016 attribués à des fournisseurs de logiciels espions.
>More than 60 of the Adobe, Google, Android, Microsoft, Mozilla and Apple zero-days that have come to light since 2016 attributed to spyware vendors.  ]]>
2024-02-06T10:49:32+00:00 https://www.securityweek.com/google-links-over-60-zero-days-to-commercial-spyware-vendors/ www.secnews.physaphae.fr/article.php?IdArticle=8447244 False Studies,Mobile,Commercial None 4.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les États-Unis impose des restrictions de visa aux personnes impliquées dans la surveillance illégale de logiciels espions<br>U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance The U.S. State Department said it\'s implementing a new policy that imposes visa restrictions on individuals who are linked to the illegal use of commercial spyware to surveil civil society members. "The misuse of commercial spyware threatens privacy and freedoms of expression, peaceful assembly, and association," Secretary of State Antony Blinken said. "Such targeting has been]]> 2024-02-06T10:30:00+00:00 https://thehackernews.com/2024/02/us-imposes-visa-restrictions-on-those.html www.secnews.physaphae.fr/article.php?IdArticle=8447154 False Commercial None 2.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Google: Les gouvernements doivent faire plus pour lutter contre les logiciels espions commerciaux<br>Google: Governments need to do more to combat commercial spyware L'industrie commerciale des logiciels espions continue de fournir des capacités de surveillance très avancées malgré les efforts pour mieux le réglementer.
>The commercial spyware industry continues to supply highly advanced surveillance capabilities despite efforts to better regulate it. ]]>
2024-02-06T10:00:00+00:00 https://cyberscoop.com/google-governments-need-to-do-more-to-combat-commercial-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8447207 False Commercial None 2.0000000000000000
Dark Reading - Informationweek Branch Google: les gouvernements stimulent une forte croissance des logiciels espions commerciaux<br>Google: Govs Drive Sharp Growth of Commercial Spyware Cos Private spyware vendors were behind nearly half of all zero-day exploits in Google products since 2014.]]> 2024-02-06T10:00:00+00:00 https://www.darkreading.com/threat-intelligence/govts-are-driving-sharp-growth-in-commercial-spyware-industry-google-warns www.secnews.physaphae.fr/article.php?IdArticle=8447205 False Vulnerability,Threat,Commercial None 2.0000000000000000 Recorded Future - FLux Recorded Future La Grande-Bretagne et la France rassemblent des diplomates pour un accord international sur les logiciels espions<br>Britain and France assemble diplomats for international agreement on spyware Le Royaume-Uni et la France organisent conjointement une conférence diplomatique à Lancaster House à Londres cette semaine pour lancer un nouvel accord international concernant «la prolifération des outils commerciaux de cyber-intrusion».Selon le ministère des Affaires étrangères, 35 nations seront représentées lors de la conférence, aux côtés de «Big Tech Leaders, d'experts juridiques et de droits de l'homme
The United Kingdom and France are to jointly host a diplomatic conference at Lancaster House in London this week to launch a new international agreement addressing “the proliferation of commercial cyber intrusion tools.” According to the Foreign Office, 35 nations will be represented at the conference, alongside “big tech leaders, legal experts, and human rights]]>
2024-02-05T23:00:35+00:00 https://therecord.media/britain-france-assemble-diplomats-international-agreement www.secnews.physaphae.fr/article.php?IdArticle=8447092 False Tool,Conference,Commercial None 2.0000000000000000
Recorded Future - FLux Recorded Future Les États-Unis annoncent la politique de restriction de visa ciblant les abus de logiciels<br>US announces visa restriction policy targeting spyware abuses Les États-Unis limiteront les visas pour les personnes «impliquées dans l'utilisation abusive des logiciels espions commerciaux», a déclaré lundi le secrétaire d'État Antony Blinken.La nouvelle politique sera utilisée contre celles «censées faciliter ou tirer des avantages financiers de l'utilisation abusive des logiciels espions commerciaux» et qui sont impliqués dans «le développement, la réalisation ou les sociétés de contrôle opérationnelles qui fournissent
The U.S. will restrict visas for people “involved in the misuse of commercial spyware,” Secretary of State Antony Blinken said Monday. The new policy will be used against those “believed to facilitate or derive financial benefit from the misuse of commercial spyware” and who are involved in “developing, directing, or operationally controlling companies that furnish]]>
2024-02-05T20:22:44+00:00 https://therecord.media/us-visa-policy-addresses-spyware-abuse www.secnews.physaphae.fr/article.php?IdArticle=8447038 False Commercial None 3.0000000000000000
CyberScoop - scoopnewsgroup.com special Cyber Le Département d'État ne délivrera pas de visas aux personnes liées à la maltraitance des logiciels espions<br>State Department will not issue visas to individuals linked to spyware abuse Le Département d'État sera au cas par cas de refuser des visas pour les personnes cherchant à se rendre aux États-Unis et qui ont été impliqués dans l'utilisation abusive des logiciels espions commerciaux, a annoncé lundi le secrétaire d'État Antony Blinken. & # 160;La décision du Département d'État est la dernière d'une chaîne de l'administration Biden qui cherche [& # 8230;]
>The State Department will on a case-by-case basis deny visas for individuals seeking to travel to the United States and who have been implicated in the misuse of commercial spyware, Secretary of State Antony Blinken announced Monday.  The move by the State Department is the latest in a string by the Biden administration that seeks […] ]]>
2024-02-05T19:08:55+00:00 https://cyberscoop.com/visa-travel-commercial-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8447025 False Commercial None 2.0000000000000000
Bleeping Computer - Magazine Américain Les États-Unis annoncent l'interdiction de visa sur les liens avec des logiciels espions commerciaux<br>US announces visa ban on those linked to commercial spyware Secretary of State Antony J. Blinken announced today a new visa restriction policy that will enable the Department of State to ban those linked to commercial spyware from entering the United States. [...]]]> 2024-02-05T15:26:06+00:00 https://www.bleepingcomputer.com/news/security/us-announces-visa-ban-on-those-linked-to-commercial-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=8447037 False Commercial None 2.0000000000000000 Zataz - Magazine Francais de secu [Info ZATAZ] – Piratage d\'un site commercial dédié aux demandes de visas 2024-02-02T17:14:12+00:00 https://www.zataz.com/info-zataz-piratage-dun-site-commercial-dedie-aux-demandes-de-visas/ www.secnews.physaphae.fr/article.php?IdArticle=8446068 False Commercial None 3.0000000000000000 Global Security Mag - Site de news francais Tendances de la Cybersécurité en 2024 : Les Nouveaux Défis de la Protection en Ligne Points de Vue]]> 2024-02-01T10:18:51+00:00 https://www.globalsecuritymag.fr/tendances-de-la-cybersecurite-en-2024-les-nouveaux-defis-de-la-protection-en.html www.secnews.physaphae.fr/article.php?IdArticle=8445514 False Commercial None 3.0000000000000000 CrowdStrike - CTI Society CrowdStrike a nommé un leader de Forrester Wave pour la sécurité de la charge de travail cloud<br>CrowdStrike Named a Leader in Forrester Wave for Cloud Workload Security Today, we\'re proud to announce that Forrester has named CrowdStrike a Leader in The Forrester Wave™: Cloud Workload Security, Q1 2024, stating “CrowdStrike shines in agentless CWP [cloud workload protection] and container runtime protection.” Forrester identified the 13 most significant vendors in cloud workload security and researched, analyzed and scored them based on the strengths […]]]> 2024-01-30T14:38:58+00:00 https://www.crowdstrike.com/blog/forrester-names-crowdstrike-a-leader-in-cloud-workload-security-q1-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8449689 False Cloud,Commercial None 2.0000000000000000 Silicon - Site de News Francais Incidents sur Microsoft Teams : les SLA activables 2024-01-30T09:01:14+00:00 https://www.silicon.fr/incidents-microsoft-teams-sla-activables-475390.html www.secnews.physaphae.fr/article.php?IdArticle=8444703 False Commercial None 4.0000000000000000 The State of Security - Magazine Américain Le rapport sur le cyber-préparation de Hiscox met en lumière la cybersécurité commerciale<br>HISCOX Cyber Readiness Report Shines Light on Commercial Cybersecurity One of the most important concerns for organizations of all sizes is protection against cyberattacks and other digital threats to security. These dangers can prove a major setback for a company, and many even pose an existential threat. In order to effectively prevent cybersecurity incidents and protect sensitive data and other vital assets, organizations must be prepared for the possibility of an attack. This requires knowledge of threat trends and the digital landscape, things that are constantly in flux, so staying up to date on the latest developments is of the utmost importance. Insurance...]]> 2024-01-30T02:10:10+00:00 https://www.tripwire.com/state-of-security/hiscox-cyber-readiness-report-shines-light-commercial-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8444705 False Threat,Commercial None 2.0000000000000000 Recorded Future - FLux Recorded Future Achats de la NSA d'Américains \\ 'Les données personnelles des courtiers sont illégales, dit le sénateur<br>NSA purchases of Americans\\' personal data from brokers is illegal, senator says Le sénateur Ron Wyden (D-Ore.) A affirmait jeudi que l'achat de l'agence de sécurité nationale \\ (NSA) des Américains \\ 'Internet Records de Data Brokers est illégal sur la base d'une récente décision de la Federal Trade Commission, Wyden a publié des documents montrantDes hauts responsables de la défense reconnaissant qu'ils achètent des données commerciales, y compris les métadonnées Internet et les informations associées aux téléphones situés aux États-Unis
Sen. Ron Wyden (D-Ore.) on Thursday asserted that National Security Agency\'s (NSA) purchase of Americans\' internet records from data brokers is illegal based on a recent Federal Trade Commission ruling, Wyden released documents showing senior defense officials acknowledging they buy commercial data, including internet metadata and information associated with phones located inside the U.S. The]]>
2024-01-26T00:58:13+00:00 https://therecord.media/nsa-purchases-american-personal-data-from-brokers-wyden www.secnews.physaphae.fr/article.php?IdArticle=8443194 False Commercial None 3.0000000000000000
ProofPoint - Cyber Firms 5 Common Privilege Escalation Attack Techniques with Examples 2024-01-24T06:00:39+00:00 https://www.proofpoint.com/us/blog/identity-threat-defense/privilege-escalation-attack www.secnews.physaphae.fr/article.php?IdArticle=8443584 False Tool,Vulnerability,Threat,Commercial None 3.0000000000000000 ProofPoint - Cyber Firms 5 Techniques d'attaque d'escalade communes avec des exemples<br>5 Common Privilege Escalation Attack Techniques with Examples 2024-01-24T06:00:39+00:00 https://www.proofpoint.com/us/blog/identity-threat-defense//privilege-escalation-attack www.secnews.physaphae.fr/article.php?IdArticle=8442590 True Tool,Vulnerability,Threat,Commercial None 3.0000000000000000 TrendLabs Security - Editeur Antivirus 18X Un leader de Gartner Magic Quadrant pour Epp<br>18X a Leader in Gartner Magic Quadrant for EPP Explore why Trend Micro is recognized-for the 18th time-as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms.]]> 2024-01-22T00:00:00+00:00 https://www.trendmicro.com/en_us/research/24/a/endpoint-gartner-magic-quadrant-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8441855 False Prediction,Commercial None 3.0000000000000000 Silicon - Site de News Francais Digital workplace : l\'empreinte de Microsoft sur les intranets 2024-01-18T09:16:42+00:00 https://www.silicon.fr/digital-workplace-magic-quadrant-intranets-475069.html www.secnews.physaphae.fr/article.php?IdArticle=8440208 False Commercial None 3.0000000000000000 Silicon - Site de News Francais Gestion du travail collaboratif : l\'opportunisme guide l\'adoption 2024-01-17T08:19:01+00:00 https://www.silicon.fr/gestion-travail-collaboratif-magic-quadrant-2023-475032.html www.secnews.physaphae.fr/article.php?IdArticle=8439799 False Tool,Commercial None 3.0000000000000000 Silicon - Site de News Francais Protection des terminaux : on-prem et legacy deviennent vraiment l\'exception 2024-01-16T16:14:32+00:00 https://www.silicon.fr/protection-terminaux-epp-magic-quadrant-2023-475010.html www.secnews.physaphae.fr/article.php?IdArticle=8439601 False Commercial None 3.0000000000000000 Global Security Mag - Site de news francais LogPoint a annoncé la sortie de LogPoint Business-Critical Security<br>Logpoint has announced the release of Logpoint Business-Critical Security revues de produits
Logpoint boosts BCS solution with cloud security capabilities Logpoint\'s new BCS for SAP BTP offers cloud security capabilities to help organisations manage monitoring and threat detection in SAP Business Technology Platform (BTP) - Product Reviews]]>
2024-01-16T10:19:46+00:00 https://www.globalsecuritymag.fr/logpoint-has-announced-the-release-of-logpoint-business-critical-security.html www.secnews.physaphae.fr/article.php?IdArticle=8439509 False Threat,Cloud,Commercial None 2.0000000000000000
Global Security Mag - Site de news francais Radiflow annonce leur application de connecteur graphique de service pour la gestion des technologies opérationnelles ServiceNow (OTM)<br>Radiflow announces their Service Graph Connector application for ServiceNow Operational Technology Management (OTM) revues de produits
Radiflow Announces Rich Asset Data Discovery Developed on the Now Platform to Integrate Asset Discovery Within ServiceNow Operational Technology Management. Radiflow\'s SGC app seamlessly synchronizes asset inventory and device relationships from their platform with ServiceNow OTM CMDB. “This integration provides accurate and comprehensive OT asset inventory, and gains unified visibility across the organization\'s IT and OT domains,” said Ilan Barda, Co-Founder & CEO of Radiflow. - Product Reviews]]>
2024-01-16T08:14:26+00:00 https://www.globalsecuritymag.fr/radiflow-announces-their-service-graph-connector-application-for-servicenow.html www.secnews.physaphae.fr/article.php?IdArticle=8439492 False Industrial,Commercial None 2.0000000000000000
Silicon - Site de News Francais Services réseau managés : une photographie du marché, sécurité comprise 2024-01-16T07:10:06+00:00 https://www.silicon.fr/services-reseau-mns-magic-quadrant-2023-474978.html www.secnews.physaphae.fr/article.php?IdArticle=8439451 False Commercial None 3.0000000000000000 Silicon - Site de News Francais Atos nomme Paul Saleh, son directeur financier, à la Direction Générale 2024-01-15T10:36:47+00:00 https://www.silicon.fr/atos-nomme-paul-saleh-son-directeur-financier-a-la-direction-generale-474944.html www.secnews.physaphae.fr/article.php?IdArticle=8439183 False Commercial None 1.00000000000000000000 Palo Alto Network - Site Constructeur Palo Alto Networks reconnus comme un leader dans le Gartner Magic Quadrant 2023 pour les plateformes de protection des points finaux (EPP)<br>Palo Alto Networks Recognized as a Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) Palo Alto Networks was named a leader in endpoint protection platforms by Gartner for Cortex XDR. ]]> 2024-01-12T16:15:40+00:00 https://www.paloaltonetworks.com/blog/2024/01/palo-alto-networks-recognized-as-a-leader-in-the-2023-gartner-magic-quadrant-for-endpoint-protection-platforms-epp/ www.secnews.physaphae.fr/article.php?IdArticle=8438328 False Commercial None 3.0000000000000000 Silicon - Site de News Francais Du SLA au XLA : le basculement des services managés de mobilité 2024-01-09T13:29:13+00:00 https://www.silicon.fr/magic-quadrant-services-mobilite-manages-2023-474788.html www.secnews.physaphae.fr/article.php?IdArticle=8437139 False Commercial None 2.0000000000000000 The Register - Site journalistique Anglais Le premier lander lunaire privé de l'Amérique souffre \\ 'critique \\' fuite de carburant en route vers la lune<br>America\\'s first private lunar lander suffers \\'critical\\' fuel leak en route to Moon 2024-01-08T21:36:36+00:00 https://go.theregister.com/feed/www.theregister.com/2024/01/08/astrobotic_lunar_lander_failure/ www.secnews.physaphae.fr/article.php?IdArticle=8436828 False Commercial None 3.0000000000000000 Silicon - Site de News Francais SD-WAN : quelles bases pour aller vers le SASE ? 2024-01-08T10:16:15+00:00 https://www.silicon.fr/sd-wan-2023-magic-quadrant-474736.html www.secnews.physaphae.fr/article.php?IdArticle=8436535 False Commercial None 2.0000000000000000 Silicon - Site de News Francais Gestion des actifs logiciels (SAM) : des fournisseurs qui manquent d\'anticipation ? 2024-01-05T16:57:41+00:00 https://www.silicon.fr/sam-magic-quadrant-2023-474723.html www.secnews.physaphae.fr/article.php?IdArticle=8435196 False Commercial None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Coupe de cordon: câbles que vous ne connaissiez pas!<br>Cord cutting: Cables that you didn\\'t know about! AT&T along with AST-Science successfully made a call. Well, in the 21st century that’s not very “Mr. Watson, come here. I want to see you.”, but this call was on another level, or as one could say, out of this world! To back up a bit, telecommunications as we know it has been a terrestrial endeavor since those words were uttered by Dr. Alexander Graham Bell to Mr. Watson. While we are all too familiar with the telephone poles and cables outside our homes, alongside highways (at least as my mom remembers), and train lines (from my grandfather), there are in fact an additional 745,645 miles of cables in the ocean floor connecting various countries. Why are these bits of cable important, you may ask? Well, as much as we may love our movies and media and their portrayal of communication between 2 super villains using phones that bounce signals off various satellites and detour them to different countries to set off a countdown of a doomed nuclear missile countdown, the reality is that the longest distance your wireless signal travels from your mobile phone is to your closest cell phone tower. Let me repeat that again-when you call your friends to your house for “Thanksgiving leftover pizza” the longest distance the wireless signal travels from your mobile phone is to your closest cell phone tower. No bouncy-bouncy, no detours. Sorry Hollywood! Hello, practical physics! If that didn’t make you question reality, let me explain this (consider this my PSA for the day!) a little more. Each time you pick up your mobile phone to make a call, your analog voice is converted to digital (that Matrix style 0’s and 1’s) and sent via electromagnetic waves through your phone\'s antenna to the closest cell phone tower. From the tower, these waves are converted to light pulses (I know this is more fun than the bouncy-bouncy!!) which are then carried at the speed of light via underground optical fiber cables (see I told you those cables were important) to the destination cell tower where they are converted back to electromagnetic waves and sent to the mobile phone of the person you are calling and converted back to analog-all in a split second. Now there is other fun stuff happening, like locating the cell phone, knowing if the phone is busy, and worrying about frequency bandwidths, but hey, I am taking a little bit of Hollywood artistic license here. Not to mention, I have completely skipped voice-over internet/data. But we do have to get back to AT&T and AST. According to their website, AST SpaceMobile is building the first and only global cellular broadband network in space to operate directly with standard, unmodified mobile devices based on an over 2600 IP and patent portfolio. In 2022, AST launched “Bluewalker3” satellite to communicate directly with unmodified mobile phones, with a future goal of launching multiple commercial satellites aptly named “BlueBirds”-well, kudos to whoever came up with the names, competitively speaking that is, without naming names. While September 2023 was n]]> 2024-01-02T14:58:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/cord-cutting-cables-that-you-didnt-know-about www.secnews.physaphae.fr/article.php?IdArticle=8432999 False Mobile,Medical,Commercial None 3.0000000000000000 Silicon - Site de News Francais Bases de données cloud : entre écosystèmes et data fabrics 2024-01-02T13:41:44+00:00 https://www.silicon.fr/bases-donnees-cloud-dbaas-magic-quadrant-2023-474587.html www.secnews.physaphae.fr/article.php?IdArticle=8432938 False Cloud,Commercial None 2.0000000000000000 ProofPoint - Cyber Firms Pointpoint de preuve nommé fournisseur représentatif en 2023 Gartner & Reg;Guide du marché pour la gouvernance des communications numériques<br>Proofpoint Named as a Representative Vendor in 2023 Gartner® Market Guide for Digital Communications Governance 2023-12-29T08:35:15+00:00 https://www.proofpoint.com/us/blog/compliance-and-archiving/2023-gartner-market-guide www.secnews.physaphae.fr/article.php?IdArticle=8430864 False Tool,Threat,Commercial None 2.0000000000000000 knowbe4 - cybersecurity services Bon!Je l'ai fait dans le top 25 PDG de cybersécurité à regarder en 2024<br>Nice! I made it in the Top 25 Cybersecurity CEOs to Watch in 2024  Nice! & nbsp; Je l'ai fait dans les 25 meilleurs PDG de cybersécurité à surveiller en 2024 Le Cyberexpress est un magazine de cybersécurité soutenu par VC qui fournit les dernières nouvelles et analyses sur l'industrie de la sécurité de l'information.Ils ont publié un article le 20 décembre 2023 avec le titre: "Top 25 PDG de cybersécurité à surveiller en 2024", et ont écrit: & nbsp; "Ces dirigeants ont démontré un engagement inébranlable envers l'innovation, en utilisant la coupe-Edge Technologies pour fortifier les défenses de sécurité. À une époque marquée par une évolution technologique incessante et l'omniprésence des cybermenaces, le rôle des professionnels de la cybersécurité est devenu de plus en plus important. & nbsp;
Nice! I made it in the Top 25 Cybersecurity CEOs to Watch in 2024 The CyberExpress is a VC-backed cyber security news mag that provides the latest news and analysis about the information security industry. They published an article December 20, 2023 with the title: "Top 25 Cybersecurity CEOs to Watch in 2024", and wrote: "These leaders have demonstrated an unwavering commitment to innovation, employing cutting-edge technologies to fortify security defenses. In an era marked by relentless technological evolution and the omnipresence of cyber threats, the role of cybersecurity professionals has become increasingly important. ]]>
2023-12-26T19:36:38+00:00 https://blog.knowbe4.com/nice-i-made-it-in-the-top-25-cybersecurity-ceos-to-watch-in-2024 www.secnews.physaphae.fr/article.php?IdArticle=8429445 False Commercial None 2.0000000000000000
Securonix - Siem Le meilleur du blog Securonix<br>The Best of the Securonix Blog The Best of the Securonix Blog, top blog posts in 2023. advisories, product news, thought leadership, timely information]]> 2023-12-26T13:00:17+00:00 https://www.securonix.com/blog/the-best-of-the-securonix-blog/ www.secnews.physaphae.fr/article.php?IdArticle=8429436 False Commercial None 2.0000000000000000 Global Security Mag - Site de news francais Cisco pour acquérir l'isovalent<br>Cisco to Acquire Isovalent nouvelles commerciales
Cisco to Acquire Isovalent to Define the Future of Multicloud Networking and Security Cisco intends to acquire privately held Isovalent, Inc., a leader in open source cloud native networking and security. Together, Cisco and Isovalent will build leading edge protection for every workload on every cloud. Cisco is committed to nurturing, investing in and contributing to eBPF, Cilium, Tetragon, and cloud native open source communities. - Business News]]>
2023-12-22T13:08:13+00:00 https://www.globalsecuritymag.fr/cisco-to-acquire-isovalent.html www.secnews.physaphae.fr/article.php?IdArticle=8427375 False Cloud,Commercial None 2.0000000000000000
Silicon - Site de News Francais IA générative : 7 entrepreneurs français qui vont faire 2024 2023-12-22T11:02:35+00:00 https://www.silicon.fr/sept-patrons-francais-ia-generative-474539.html www.secnews.physaphae.fr/article.php?IdArticle=8427314 False Commercial None 2.0000000000000000 Korben - Bloger francais X-Pipe – Le hub pour vos connexions shell et votre gestion de fichiers à distance 2023-12-22T08:00:00+00:00 https://korben.info/x-pipe-hub-connexions-shell-gestion-fichiers-distance.html www.secnews.physaphae.fr/article.php?IdArticle=8427287 False Commercial None 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les experts détaillent le modèle de licence de plusieurs millions de dollars des logiciels espions prédateurs<br>Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an "add-on feature" and that it depends on the licensing options opted by a customer. "In 2021, Predator spyware couldn\'t survive a reboot on the infected Android system (it had it on iOS)," Cisco Talos researchers Mike Gentile, Asheer Malhotra, and Vitor]]> 2023-12-21T22:18:00+00:00 https://thehackernews.com/2023/12/multi-million-dollar-predator-spyware.html www.secnews.physaphae.fr/article.php?IdArticle=8426908 False Mobile,Commercial None 2.0000000000000000