www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-22T02:26:05+00:00 www.secnews.physaphae.fr Veracode - Application Security Research, News, and Education Blog Faits saillants de la conférence RSA: Secure by Design, IA Insights et Collaboration mondiale<br>Highlights from RSA Conference: Secure by Design, AI Insights, and Global Collaboration RSA Conference 2024 brought together industry experts, practitioners, and policymakers to discuss the latest trends and challenges in cybersecurity. We showcased our commitment to CISA\'s Secure by Design, explored the potential of AI in risk management, and emphasized the significance of global collaboration. Here are some highlights from our time at RSA Conference, providing insights into the discussions and announcements that shape the future of cybersecurity.  Major pledge to a future that\'s Secure by Design  A significant development emerged at the conference with the Cybersecurity and Infrastructure Security Agency\'s (CISA) announcement of a major pledge around Secure by Design. This initiative brought together 68 leading technology firms, including Microsoft, Google, IBM, and many others, to build better security into their products in the next year.   "CISA\'s Secure by Design pledge is a strong, pragmatic step forward in its commitment to work with the…]]> 2024-05-20T11:17:47+00:00 https://www.veracode.com/blog/customer-news/highlights-rsa-conference-secure-design-ai-insights-and-global-collaboration www.secnews.physaphae.fr/article.php?IdArticle=8503475 False Conference None None Techworm - News Une nouvelle vulnérabilité Wi-Fi entraîne une attaque de confusion SSID<br>New Wi-Fi Vulnerability Leads To SSID Confusion Attack dit dans leur papier. La cause profonde du nouveau défaut de conception Wi-Fi réside dans la norme IEEE 802.11, qui sous-tend le fonctionnement du Wi-Fi et ne nécessite pas que le nom du réseau (SSID) soit toujours authentifié pendant le processus de connexion. En conséquence, ce manque d'authentification SSID attire des victimes sans méfiance à se connecter à un réseau moins fiable en usurpant les SSID légitimes, conduisant potentiellement à l'interception des données et à d'autres violations de sécurité. Selon top10vpn , six universités (y compris les institutions au Royaume-Uni et aux États-Unis) ont été identifiées jusqu'à présent où le personnel et les étudiants sont particulièrement à risque en raison de la réutilisation des diplômes. Pour se défendre contre l'attaque de confusion SSID, les chercheurs ont proposé plusieurs défenses, telles que toujours, y compris le SSID en dérivation clé pendant la poignée de main à 4 voies lors de la connexion à des réseaux protégés, l'inclusion du SSID en tant que données authentifiées supplémentaires dans le 4-WAYPACHE, Amélioration de la protection de la balise pour aider à empêcher l'usurpation, à mettre à jour la norme Wi-Fi 802.11 pour imposer l'authentification du SSID lors de la connexion à un réseau protégé;et éviter la réutilisation des informations d'identification sur différents SSIDS.
Researchers at Belgium\'s KU Leuven have discovered a new security vulnerability that exploits a design flaw in the IEEE 802.11 standard. This vulnerability could potentially expose millions of users to traffic interception and manipulation. The SSID Confusion Attack, identified under the identifier]]>
2024-05-17T12:19:02+00:00 https://www.techworm.net/2024/05/wi-fi-vulnerability-ssid-confusion-attack.html www.secnews.physaphae.fr/article.php?IdArticle=8501466 False Vulnerability,Threat,Conference None 4.0000000000000000
The Register - Site journalistique Anglais La mission numéro un du Cyberspace est étouffée de Pékin dans le cyberespace<br>Stifling Beijing in cyberspace is now British intelligence\\'s number-one mission 2024-05-16T14:45:07+00:00 https://go.theregister.com/feed/www.theregister.com/2024/05/16/the_uks_alarm_over_china/ www.secnews.physaphae.fr/article.php?IdArticle=8500998 False Conference None 3.0000000000000000 Fortinet - Fabricant Materiel Securite Conférence RSA 2024: Embrasser la transparence responsable et radicale<br>RSA Conference 2024: Embracing Responsible, Radical Transparency Fortinet joined and collaborated with cybersecurity experts at RSAC 2024 to push important industry conversations forward.]]> 2024-05-16T13:00:00+00:00 https://www.fortinet.com/blog/industry-trends/rsa-conference-2024-embracing-responsible-radical-transparency www.secnews.physaphae.fr/article.php?IdArticle=8501039 False Conference None 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC 2024 Recapt RSA: centrer sur la cyber-résilience<br>2024 RSA Recap: Centering on Cyber Resilience Nouvelles recherches de niveauBlue révèlent 2024 Tendances de la cyber-résilience & ndash;Theresa Lanowitz & ndash;RSA24 # 2 niveaublue &Groupe de stratégie d'entreprise: un regard sur la cyber-résilience pour l'accès aux Futures & Trade de niveau complet;RAPPORT, Téléchargez une copie complémentaire ici . ]]> 2024-05-16T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/2024-rsa-recap-centering-on-cyber-resilience www.secnews.physaphae.fr/article.php?IdArticle=8500829 False Conference None 3.0000000000000000 The Register - Site journalistique Anglais NCSC CTO: le marché brisé doit être fixé pour inaugurer de la nouvelle technologie<br>NCSC CTO: Broken market must be fixed to usher in new tech 2024-05-16T09:33:06+00:00 https://go.theregister.com/feed/www.theregister.com/2024/05/16/ncsc_cto_broken_market_must/ www.secnews.physaphae.fr/article.php?IdArticle=8500826 False Vulnerability,Conference None 3.0000000000000000 Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique IA, plateformes, zéro confiance et autres sujets qui ont dominé la conférence RSA 2024<br>AI, Platforms, Zero Trust, and Other Topics That Dominated RSA Conference 2024 Chaque année, il y a un peu de temps à la conférence RSA et peu importe à quel point vous essayez, il peut être difficile de tout prendre. Entre un flocage tentaculaire avec des centaines de vendeurs en lice pour l'attention, des séances de parole avec des expertsDe toute l'industrie, des réunions privées avec des clients et des prospects, ainsi que des événements sociaux [& # 8230;]
>Every year there\'s quite a bit happening at the RSA Conference and no matter how hard you try, it can be difficult to take it all in. Between a sprawling showfloor with hundreds of vendors vying for attention, speaking sessions with experts from across the industry, private meetings with customers and prospects, plus social events […] ]]>
2024-05-15T18:07:31+00:00 https://www.netskope.com/blog/ai-platforms-zero-trust-and-other-topics-that-dominated-rsa-conference-2024 www.secnews.physaphae.fr/article.php?IdArticle=8500404 False Conference None 2.0000000000000000
IndustrialCyber - cyber risk firms for industrial Élévation de la cybersécurité industrielle: idées de la conférence RSA 2024<br>Elevating industrial cybersecurity: Insights from the 2024 RSA conference La conférence RSA récemment terminée a mis en évidence la cybersécurité industrielle comme thème central, soulignant son intégration dans le courant dominant ...
>The recently concluded 2024 RSA Conference highlighted industrial cybersecurity as a central theme, underscoring its integration into mainstream... ]]>
2024-05-15T05:36:57+00:00 https://industrialcyber.co/features/elevating-industrial-cybersecurity-insights-from-the-2024-rsa-conference/ www.secnews.physaphae.fr/article.php?IdArticle=8500003 False Industrial,Conference None 4.0000000000000000
ProofPoint - Firm Security Voici ce que les 20 meilleurs PDG de cybersécurité et CTOS disaient à la conférence RSA 2024<br>Here\\'s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSA Conference 2024 2024-05-13T16:48:06+00:00 https://www.proofpoint.com/us/newsroom/news/heres-what-20-top-cybersecurity-ceos-and-ctos-were-saying-rsa-conference-2024 www.secnews.physaphae.fr/article.php?IdArticle=8501347 False Conference None 2.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC 2024 Recaps RSA: permettez-nous de nous réintroduire<br>2024 RSA Recap: Allow us to Reintroduce Ourselves annoncé Le lancement de niveaublue , anciennement connu sous le nom de cybersécurité AT & T.En signifiant un nouveau départ passionnant pour l'entreprise, j'ai été rejoint par le PDG de niveauBlue, Bob McCullen pour rencontrer des clients clés, des analystes et des presseurs pendant la conférence. LevelBlue propose des services de sécurité gérés stratégiques, ainsi que des consultants par des experts de pointe, des renseignements et de la détection des menaces et un soutien continu du Centre des opérations de sécurité (SOC);servant de conseiller de confiance en cybersécurité aux entreprises du monde entier.Comme l'analyste de technologie renommée Steve McDowell l'a noté & ldquo; LevelBlue émerge dans le paysage de la cybersécurité avec des actifs et une expertise importants hérités de AT & t et enrichi par l'acquisition d'Alienvault. & Rdquo; Pour célébrer l'annonce de LevelBlue, nous avons également organisé un dîner de bienvenue pour les médias auxquels les participants avaient un accès exclusif pour en savoir plus sur la formation de niveauBlue et ce qui est le prochain pour l'entreprise.Nous avons reçu d'excellents commentaires et excitation à propos de notre lancement à partir de publications notables, de cybersécurité et de technologie, notamment forbes , l'enregistrement, et la nouvelle pile. Un merci spécial à RSAC, à toute l'équipe de niveau de niveau, aux médias et à nos partenaires pour leur collaboration dans un lancement réussi.Suivez le niveaublue sur x , LinkedIn , Facebook , et YouTube Pour rester à jour sur notre voyage! belinda niveaublue tawnya snacks cyber résilience rsa stand todd dans le panneau Sundhar à la table
The 2024 RSA Conference has officially wrapped, and this year’s event served as the perfect backdrop for us to make our re-introduction to the industry. Introducing LevelBlue, the Trusted Cybersecurity Advisors On day one of RSA, we officially ]]>
2024-05-13T10:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/2024-rsa-recap-allow-us-to-reintroduce-ourselves www.secnews.physaphae.fr/article.php?IdArticle=8498816 False Threat,Conference None 3.0000000000000000
Wired Threat Level - Security News À quoi s'attendre à Google I / O 2024, et comment le regarder<br>What to Expect at Google I/O 2024, and How to Watch It The annual developer conference kicks off with a keynote address on Tuesday. Look out for updates on Android, Search, and Assistant, plus a whole lot of AI news.]]> 2024-05-10T21:53:16+00:00 https://www.wired.com/story/google-io-2024-how-to-watch-what-to-expect/ www.secnews.physaphae.fr/article.php?IdArticle=8497452 False Mobile,Conference None 3.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET C'est une enveloppe!RSA Conference 2024 Faits saillants & # 8211;Semaine en sécurité avec Tony Anscombe<br>It\\'s a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe More than 40,000 security experts descended on San Francisco this week. Let\'s now look back on some of the event\'s highlights – including the CISA-led \'Secure by Design\' pledge also signed by ESET.]]> 2024-05-10T11:46:00+00:00 https://www.welivesecurity.com/en/videos/rsac-2024-week-security-tony-anscombe/ www.secnews.physaphae.fr/article.php?IdArticle=8497635 False Conference None 2.0000000000000000 We Live Security - Editeur Logiciel Antivirus ESET Conférence RSA 2024: surcharge de battage médiatique de l'IA<br>RSA Conference 2024: AI hype overload Can AI effortlessly thwart all sorts of cyberattacks? Let\'s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.]]> 2024-05-09T18:41:39+00:00 https://www.welivesecurity.com/en/cybersecurity/rsac-2024-ai-hype-overload/ www.secnews.physaphae.fr/article.php?IdArticle=8497636 False Conference None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: Pourquoi les professionnels de la cybersécurité ont le devoir de sécuriser l'IA<br>#RSAC: Why Cybersecurity Professionals Have a Duty to Secure AI Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges]]> 2024-05-09T17:30:00+00:00 https://www.infosecurity-magazine.com/news/why-cybersecurity-professionals/ www.secnews.physaphae.fr/article.php?IdArticle=8496708 False Conference None 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: Comment les CISO devraient se protéger contre les actes d'accusation<br>#RSAC: How CISOs Should Protect Themselves Against Indictments Experts at the RSA Conference discussed what CISOs can do to protect themselves against legal pressure]]> 2024-05-09T16:45:00+00:00 https://www.infosecurity-magazine.com/news/ciso-should-protect-indictments/ www.secnews.physaphae.fr/article.php?IdArticle=8496678 False Conference None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: Trois stratégies pour stimuler la sécurité open-source<br>#RSAC: Three Strategies to Boost Open-Source Security Experts at the RSA Conference discussed how governments, the open-source community and end users can work together to drastically improve the security of open-source software]]> 2024-05-08T20:15:00+00:00 https://www.infosecurity-magazine.com/news/strategies-boost-open-source/ www.secnews.physaphae.fr/article.php?IdArticle=8496128 False Conference None 3.0000000000000000 Dark Reading - Informationweek Branch Quel est le chemin futur pour les cisos?<br>What\\'s the Future Path for CISOs? A panel of former CISOs will lead the closing session of this week\'s RSA Conference to discuss challenges and opportunities.]]> 2024-05-07T19:46:02+00:00 https://www.darkreading.com/cyber-risk/what-s-the-future-path-for-cisos www.secnews.physaphae.fr/article.php?IdArticle=8495462 False Conference None 2.0000000000000000 Global Security Mag - Site de news francais Forcepoint dévoile une sécurité de données alimentée par Ai<br>Forcepoint Unveils AI-Powered Forcepoint ONE Data Security revues de produits
Forcepoint Unveils AI-Powered Forcepoint ONE Data Security for Complete Cloud-to-Endpoint Data Protection Highlights \'Data Security Everywhere\' at RSA Conference 2024 - Product Reviews]]>
2024-05-07T19:21:50+00:00 https://www.globalsecuritymag.fr/forcepoint-unveils-ai-powered-forcepoint-one-data-security.html www.secnews.physaphae.fr/article.php?IdArticle=8495452 False Conference None 2.0000000000000000
Wired Threat Level - Security News Google Pixel 8a: nouvelles, spécifications, fonctionnalités, prix, date de sortie<br>Google Pixel 8A: News, Specs, Features, Price, Release Date The company\'s refined midrange Android phone packs its flagship Tensor G3 chipset. The handset was announced ahead of next week\'s Google I/O conference.]]> 2024-05-07T16:00:00+00:00 https://www.wired.com/story/google-pixel-8a/ www.secnews.physaphae.fr/article.php?IdArticle=8495307 False Mobile,Conference None 3.0000000000000000 ProofPoint - Firm Security Sumit Dhawan, PDG, Proofpoint sur Nightdragon: Live from RSA Conference<br>Sumit Dhawan, CEO, Proofpoint on NightDragon: Live From RSA Conference 2024-05-07T11:49:43+00:00 https://www.proofpoint.com/us/newsroom/news/sumit-dhawan-ceo-proofpoint-nightdragon-live-rsa-conference www.secnews.physaphae.fr/article.php?IdArticle=8499255 False Conference None 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine #RSAC: les acteurs de la menace armé le hacktivisme pour un gain financier<br>#RSAC: Threat Actors Weaponizing Hacktivism for Financial Gain Recorded Future\'s Alexander Leslie highlights the increasingly blurred lines between hacktivism, financial cybercrime and nation-state activities during the RSA Conference 2024]]> 2024-05-06T22:55:00+00:00 https://www.infosecurity-magazine.com/news/hacktivism-financial-gain-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8494850 False Threat,Conference None 3.0000000000000000 AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC Introduction de niveauBlue: élever la confiance des entreprises en simplifiant la sécurité<br>Introducing LevelBlue: Elevating Business Confidence By Simplifying Security ici . En 2022, j'ai fondé ma société de capital-investissement, Willjam Ventures, et depuis lors, nous avons tenu une expérience exceptionnelle à investir et à opérer les entreprises de cybersécurité de classe mondiale.Ce dernier investissement dans LevelBlue ne fait pas exception, ce qui témoigne de cet engagement.Nous sommes enthousiasmés par l'opportunité à venir pour LevelBlue.Ici & rsquo; s pourquoi: & # 9679; sa mission & ndash;pour simplifier la sécurité et faire de la cyber-résilience un résultat réalisable & ndash;est essentiel au succès des entreprises. Alors que les organisations continuent d'innover, des technologies telles que l'intelligence artificielle (IA) et le cloud computing créent un paysage de menace plus dynamique et élargi.Avec LevelBlue, les organisations n'ont plus besoin de sacrifier l'innovation avec la sécurité et le ndash;Ils réalisent les deux, avec confiance.Avec plus de 1 300 employés axés sur cette mission, LevelBlue propose des services de sécurité stratégiques, notamment des services de sécurité gérés primés, des conseils stratégiques expérimentés, des renseignements sur les menaces et des recherches révolutionnaires & ndash;Servir de conseiller de confiance pour les entreprises du monde entier. & # 9679; LevelBlue rassemble certains des esprits les plus talentueux et les plus brillants de la cybersécurité. Tout comme tout voyage, les organisations ne devraient pas se lancer dans leur voyage de cybersécurité seul.C'est là que LevelBlue entre en jeu. Chaque membre de notre équipe de conseil a en moyenne 15 ans d'expérience en cybersécurité, détenant les dernières certifications et connaissances en travaillant avec des organisations de différents types et tailles.Je suis également ravi d'être rejoint par Sundhar Annamalai, le président de LevelBlue, qui a plus de 20 ans d'expérience dans les services technologiques et l'exécution stratégique pour aider notre entreprise à de nouveaux sommets. & # 9679; La société a une histoire de longue date de la recherche de recherches à l'avenir et neutres. Les conseillers de confiance tiennent leurs clients informés sur les dernières tendances avant qu'elles ne se produisent, et c'est à cela que LevelBlue est le meilleur.Avec la plate-forme de renseignement sur les menaces de niveau Blue, ainsi que les rapports de recherche de l'industrie de l'entreprise (plus à venir sur ce blog), les clients peuvent rester en une étape avant les dernières cyber-menaces, tout en acquittent des informations précieuses sur la façon d'allouer correctement allouéRessources de cybersécurité. La cyber-résilience n'est pas facilement définie, et elle n'est pas facilement réalisable sans le soutien nécessaire.Les services de cybersécurité stratégiques de niveauBlue aideront à résoudre ce défi à une époque où il a le plus besoin.Nous avons la bonne équipe, la bonne technologie et au bon moment dans le temps & ndash;Je suis ravi pour le voyage à venir. Pour ceux de la conférence RSA, nous vous invitons à venir en savoir plus sur LevelBlue en visitant le stand # 6155 à Moscone North Expo.Nous sommes impatients de nous présenter à vous.
Today is a monumental day for the cybersecurity industry. Live from RSA Conference 2024, I’m excited to introduce LevelBlue – a joint venture with AT&T and WillJam Ventures, to form a new, standalone managed security services busines]]>
2024-05-06T14:05:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/introducing-levelblue-elevating-business-confidence-by-simplifying-security www.secnews.physaphae.fr/article.php?IdArticle=8496673 False Threat,Cloud,Conference None 3.0000000000000000
Global Security Mag - Site de news francais Enkrypt AI Dévoies LLM Safety Leadboard<br>Enkrypt AI Unveils LLM Safety Leaderboard revues de produits
Enkrypt AI Unveils LLM Safety Leaderboard to Enable Enterprises to Adopt Generative AI Safely and Responsibly • Revolutionizing AI Security: Enkrypt AI debuts the ground-breaking LLM Safety Leaderboard at the RSA conference, setting the benchmark of transparency and security in AI technology. • Smart Choices, Safer Tech, Faster Adoption: With the LLM Safety Leaderboard, enterprises can swiftly identify the safest and most reliable AI models for their needs by understanding their vulnerabilities and enhancing tech trustworthiness. • Ethics and Compliance Front and Center: Enkrypt AI\'s latest innovation allows AI engineers to make informed decisions to uphold the highest ethical and regulatory standards, building a future where AI is safe for all. - Product Reviews]]>
2024-05-06T13:14:51+00:00 https://www.globalsecuritymag.fr/enkrypt-ai-unveils-llm-safety-leaderboard.html www.secnews.physaphae.fr/article.php?IdArticle=8494633 False Vulnerability,Conference None 2.0000000000000000
ProofPoint - Cyber Firms La sécurité des e-mails est désormais redéfinie avec des capacités de protection des menaces adaptatives dans toute la chaîne de livraison<br>Email Security is Now Redefined with Adaptive Threat Protection Capabilities Across the Entire Delivery Chain 2024-05-06T05:52:32+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/email-security-now-redefined-adaptive-threat-protection-capabilities www.secnews.physaphae.fr/article.php?IdArticle=8494489 False Ransomware,Malware,Threat,Conference None 3.0000000000000000 Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Libérer le secteur public britannique de la dette informatique héritée<br>Freeing the UK Public Sector from Legacy IT debt Alors que le secteur britannique de la cybersécurité se prépare à se réunir à Cyberuk le mois prochain, j'ai réfléchi au thème de la conférence \\ & # 8211; sécurisation un avenir numérique ouvert et résilient & # 8211; et quels pourraient être les obstacles à une telle vision.L'un des plus grands défis est sans aucun doute l'héritage élevé dans le secteur public du Royaume-Uni. & # 160;Pendant plus d'une décennie, [& # 8230;]
>As the UK cybersecurity sector prepares to meet at CyberUK next month, I have been reflecting on the conference\'s theme–Securing an open and resilient digital future–and what might be the barriers to such a vision. One of the biggest challenges is doubtless the hefty legacy IT in the UK\'s public sector.  For over a decade, […] ]]>
2024-05-01T15:49:45+00:00 https://www.netskope.com/blog/freeing-the-uk-public-sector-from-legacy-it-debt www.secnews.physaphae.fr/article.php?IdArticle=8491896 False Conference None 2.0000000000000000
Dark Reading - Informationweek Branch Les 6 séances de sécurité des données que vous ne devriez pas manquer au RSAC 2024<br>The 6 Data Security Sessions You Shouldn\\'t Miss at RSAC 2024 Themed "The Art of Possible," this year\'s conference celebrates new challenges and opportunities in the age of AI.]]> 2024-04-30T14:00:00+00:00 https://www.darkreading.com/cyberattacks-data-breaches/6-data-security-sessions-you-shouldnt-miss-rsac-2024 www.secnews.physaphae.fr/article.php?IdArticle=8491278 False Conference None 2.0000000000000000 Mandiant - Blog Sécu de Mandiant De l'assistant à l'analyste: la puissance de Gemini 1.5 Pro pour l'analyse des logiciels malveillants<br>From Assistant to Analyst: The Power of Gemini 1.5 Pro for Malware Analysis Gemini 1.5 Pro to the test to see how it performed at analyzing malware. By providing code and using a simple prompt, we asked Gemini 1.5 Pro to determine if the file was malicious, and also to provide a list of activities and indicators of compromise. We did this for multiple malware files, testing with both decompiled and disassembled code, and Gemini 1.5 Pro was notably accurate each time, generating summary reports in human-readable language. Gemini 1.5 Pro was even able to make an accurate determination of code that - at the time - was receiving zero detections on VirusTotal.  In our testing with other similar gen AI tools, we were required to divide the code into chunks, which led to vague and non-specific outcomes, and affected the overall analysis. Gemini 1.5 Pro, however, processed the entire code in a single pass, and often in about 30 to 40 seconds. Introduction The explosive growth of malware continues to challenge traditional, manual analysis methods, underscoring the urgent need for improved automation and innovative approaches. Generative AI models have become invaluable in some aspects of malware analysis, yet their effectiveness in handling large and complex malware samples has been limited. The introduction of Gemini 1.5 Pro, capable of processing up to 1 million tokens, marks a significant breakthrough. This advancement not only empowers AI to function as a powerful assistant in automating the malware analysis workflow but also significantly scales up the automation of code analysis. By substantially increasing the processing capacity, Gemini 1.5 Pro paves the way for a more adaptive and robust approach to cybersecurity, helping analysts manage the asymmetric volume of threats more effectively and efficiently. Traditional Techniques for Automated Malware Analysis The foundation of automated malware analysis is built on a combination of static and dynamic analysis techniques, both of which play crucial roles in dissecting and understanding malware behavior. Static analysis involves examining the malware without executing it, providing insights into its code structure and unobfuscated logic. Dynamic analysis, on the other hand, involves observing the execution of the malware in a controlled environment to monitor its behavior, regardless of obfuscation. Together, these techniques are leveraged to gain a comprehensive understanding of malware. Parallel to these techniques, AI and machine learning (ML) have increasingly been employed to classify and cluster malware based on behavioral patterns, signatures, and anomalies. These methodologies have ranged from supervised learning, where models are trained on labeled datasets, to unsupervised learning for clustering, which identifies patterns without predefined labels to group similar malware.]]> 2024-04-29T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/gemini-for-malware-analysis/ www.secnews.physaphae.fr/article.php?IdArticle=8500392 False Malware,Hack,Tool,Vulnerability,Threat,Studies,Prediction,Cloud,Conference Wannacry 3.0000000000000000 Global Security Mag - Site de news francais 13 mai 2024, 18 h 00 - 20 h 00 via Zoom - "Lundi de la cybersécurité" : Bug Bounty et Tests d\'intrusion Événements]]> 2024-04-26T11:15:59+00:00 https://www.globalsecuritymag.fr/13-mai-2024-18-h-00-20-h-00-via-zoom-lundi-de-la-cybersecurite-bug-bounty-et.html www.secnews.physaphae.fr/article.php?IdArticle=8489032 False Conference None 3.0000000000000000 IT Security Guru - Blog Sécurité Cato Networks pour présenter de nouvelles tactiques d'évasion de sécurité à la conférence RSA 2024<br>Cato Networks to Showcase New Security Evasion Tactics at RSA Conference 2024 Cato Networks pour présenter de nouvelles tactiques d'évasion de sécurité lors de la conférence RSA 2024 est apparue pour la première fois sur gourou de la sécurité informatique .
Cato Networks, the SASE leader, today announced that Cato CTRL, the SASE leader\'s cyber threat intelligence (CTI) research team, will demonstrate threat actors\' latest tactics designed to capitalise on organisations\' complex security architectures during presentations at the upcoming RSA Conference 2024. The talks headline Cato\'s numerous media, customer, and partner activities at the conference. “Today\'s […] The post Cato Networks to Showcase New Security Evasion Tactics at RSA Conference 2024 first appeared on IT Security Guru. ]]>
2024-04-26T10:36:36+00:00 https://www.itsecurityguru.org/2024/04/26/cato-networks-to-showcase-new-security-evasion-tactics-at-rsa-conference-2024/?utm_source=rss&utm_medium=rss&utm_campaign=cato-networks-to-showcase-new-security-evasion-tactics-at-rsa-conference-2024 www.secnews.physaphae.fr/article.php?IdArticle=8489002 False Threat,Conference None 3.0000000000000000
Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Sujets chauds pour la conférence RSA 2024<br>Hot Topics for RSA Conference 2024 La conférence RSA 2024 est presque à nos portes, nous avons donc contacté une poignée d'experts de NetSkope et avons demandé ce qu'ils espéraient ou nous attendons à entendre parler de cette année.Ici \\ est ce qu'ils ont pris dans leur esprit (alerte de spoiler & # 8211; il y a beaucoup de genai): & # 160;«Genai est toujours en tête pour la plupart [& # 8230;]
>RSA Conference 2024 is almost upon us again, so we reached out to a handful of Netskope experts and asked what they hope or expect to hear about at this year\'s show. Here\'s what they\'ve got on their mind (spoiler alert – there\'s a lot of genAI):  “GenAI is still top of mind for most […] ]]>
2024-04-24T15:46:48+00:00 https://www.netskope.com/blog/hot-topics-for-rsa-conference-2024 www.secnews.physaphae.fr/article.php?IdArticle=8488069 False Conference None 3.0000000000000000
RedCanary - Red Canary The RSA Conference talks we\'re looking forward to most From ransomware and incident response to bug bounties and Backdoors & Breaches, we read the entire RSA agenda so you don\'t have to.]]> 2024-04-24T14:04:41+00:00 https://redcanary.com/blog/security-operations/rsa-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8491310 False Ransomware,Conference None 2.0000000000000000 RedCanary - Red Canary La conférence RSA parle que nous attendons avec impatience la plupart<br>The RSA Conference talks we\\'re looking forward to most From ransomware and incident response to bug bounties and Backdoors & Breaches, we read the entire RSA agenda so you don\'t have to.]]> 2024-04-24T14:04:41+00:00 https://redcanary.com/blog/rsa-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8488003 False Ransomware,Conference None 2.0000000000000000 Global Security Mag - Site de news francais Façonner la politique de cybersécurité envers une Europe de confiance et sécurisée<br>Shaping Cybersecurity Policy towards a trusted and secure Europe enisa
Shaping Cybersecurity Policy towards a trusted and secure Europe On 17 April, the European Union Agency for Cybersecurity (ENISA), the European Commission (DG CNECT) and the Belgian presidency of the Council of the European Union organised the 2nd EU Cybersecurity Policy Conference. - ENISA]]>
2024-04-18T19:30:00+00:00 https://www.globalsecuritymag.fr/shaping-cybersecurity-policy-towards-a-trusted-and-secure-europe.html www.secnews.physaphae.fr/article.php?IdArticle=8484724 False Conference None 2.0000000000000000
Cisco - Security Firm Blog Suralimentation Cisco XDR avec IA et intelligence d'identité au RSAC 2024<br>Supercharging Cisco XDR with AI and Identity Intelligence at RSAC 2024 Discover the new Cisco XDR capabilities that will give security teams even more insight, automation, and control over your environment at RSA Conference 2024.]]> 2024-04-17T12:00:04+00:00 https://feedpress.me/link/23535/16652760/supercharging-cisco-xdr-with-ai-and-identity-intelligence-at-rsac-2024 www.secnews.physaphae.fr/article.php?IdArticle=8484082 False Conference None 2.0000000000000000 ProofPoint - Cyber Firms De l'ingénierie sociale aux abus DMARC: Ta427 \\'s Art of Information Gathering<br>From Social Engineering to DMARC Abuse: TA427\\'s Art of Information Gathering 2024-04-16T06:00:54+00:00 https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering www.secnews.physaphae.fr/article.php?IdArticle=8483299 False Malware,Tool,Threat,Conference APT 43,APT 37 2.0000000000000000 Global Security Mag - Site de news francais 25e et 26 avril Inde Cyber Revolution Summit2024 & # 8211; Cybersecurity Innovations: mener l'avenir de la protection<br>25th&26th April India Cyber Revolution Summit2024–Cybersecurity Innovations: Leading the Future of Protection événements
25th&26th April India Cyber Revolution Summit2024–Cybersecurity Innovations: Leading the Future of Protection - EVENTS]]>
2024-04-12T21:00:00+00:00 https://www.globalsecuritymag.fr/25th-26th-april-india-cyber-revolution-summit2024-cybersecurity-innovations.html www.secnews.physaphae.fr/article.php?IdArticle=8480563 True Conference None 3.0000000000000000
Global Security Mag - Site de news francais 22 et 23 mai: Angola Cyber Revolution Summit 2024 & # 8211; Cybersecurity Innovations: mener l'avenir de la protection<br>22nd &23rd May: Angola Cyber Revolution Summit 2024–Cybersecurity Innovations: Leading the Future of Protection événements
22nd &23rd May: Angola Cyber Revolution Summit 2024–Cybersecurity Innovations: Leading the Future of Protection - EVENTS]]>
2024-04-12T11:16:03+00:00 https://www.globalsecuritymag.fr/22nd-23rd-may-angola-cyber-revolution-summit-2024-cybersecurity-innovations.html www.secnews.physaphae.fr/article.php?IdArticle=8480686 False Conference None 2.0000000000000000
Global Security Mag - Site de news francais Menaces d'initiés: les entreprises ramenées de l'intérieur en raison de la cybersécurité laxiste<br>Insider Threats: Businesses Brought Down From Within Due To Lax Cybersecurity opinion
Insider Threats: Businesses Brought Down From Within Due To Lax Cybersecurity Understanding The Risks and Consequences Of Insider Threats. Trevor Cooke, the online privacy expert at EarthWeb, provides strategies to protect your business from insider threats. - Opinion]]>
2024-04-12T07:47:02+00:00 https://www.globalsecuritymag.fr/insider-threats-businesses-brought-down-from-within-due-to-lax-cybersecurity.html www.secnews.physaphae.fr/article.php?IdArticle=8480591 False Conference None 2.0000000000000000
Global Security Mag - Site de news francais David Berenfus, Cyber Show Paris : Entreprises, collectivités, découvrez les solutions en cybersécurité adaptées à votre entreprise les 29 et 30 mai 2024 à l\'Espace Champerret Interviews / ]]> 2024-04-11T23:30:00+00:00 https://www.globalsecuritymag.fr/david-berenfus-cyber-show-paris-entreprises-collectivites-decouvrez-les.html www.secnews.physaphae.fr/article.php?IdArticle=8480063 False Conference None 3.0000000000000000 Bleeping Computer - Magazine Américain Google déploie un nouveau réseau de recherche sur les appareils Android<br>Google rolls out new Find My Device network to Android devices Google is rolling out an upgraded Find My Device network to Android devices in the United States and Canada, almost one year after it was first unveiled during the Google I/O 2023 conference in May. [...]]]> 2024-04-08T14:50:43+00:00 https://www.bleepingcomputer.com/news/google/google-rolls-out-new-find-my-device-network-to-android-devices/ www.secnews.physaphae.fr/article.php?IdArticle=8478263 False Mobile,Conference None 2.0000000000000000 Sekoia - Cyber Firms De EDR à XDR: procédure pas à pas détaillée<br>From EDR to XDR: Detailed Walkthrough En 2024, les lignes entre EDR et XDR deviennent floues.De plus en plus de fournisseurs offrent des plateformes qui combinent la sécurité des points de terminaison, du réseau, du cloud et des e-mails.Tous ces outils sont conçus pour bloquer les menaces, bien qu'ils diffèrent en termes de portée et de capacités.Pour apporter plus de clarté, nous voulons vous guider à travers la cybersécurité arsenal [& # 8230;] la publication Suivante d'EDR à xdr: procédure détaillée est un article de l'ONU de blog Sekoia.io .
>In 2024, the lines between EDR and XDR are becoming blurred. More and more vendors offer platforms that combine endpoint, network, cloud, and email security. All these tools are designed to block threats, though they differ in terms of scope and capabilities.  To bring more clarity, we want to guide you through the cybersecurity arsenal […] La publication suivante From EDR to XDR: Detailed Walkthrough est un article de Sekoia.io Blog.]]>
2024-04-05T08:58:20+00:00 https://blog.sekoia.io/from-edr-to-xdr-detailed-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=8476390 False Tool,Cloud,Conference None 2.0000000000000000
HackRead - Chercher Cyber Finaliste Aembit pour la conférence RSA 2024 Innovation Sandbox<br>Aembit Finalist for RSA Conference 2024 Innovation Sandbox Par cyber navre La principale entreprise pour obtenir l'accès entre les charges de travail reconnues pour la plate-forme Aembit Workload IAM. Ceci est un article de HackRead.com Lire la publication originale: Finaliste Aembit pour RSA Conference 2024 Innovation Sandbox
>By Cyber Newswire The Leading Company for Securing Access Between Workloads Recognized for the Aembit Workload IAM Platform. This is a post from HackRead.com Read the original post: Aembit Finalist for RSA Conference 2024 Innovation Sandbox]]>
2024-04-03T14:48:18+00:00 https://www.hackread.com/aembit-finalist-rsa-conference-2024-innovation-sandbox/ www.secnews.physaphae.fr/article.php?IdArticle=8475370 False Conference None 2.0000000000000000
Global Security Mag - Site de news francais APPEL A COMMUNICATION - 15ème EDITION DES GSDAYS – 28 JANVIER 2025 Les événements de Global Security Mag / ]]> 2024-04-02T09:51:22+00:00 https://www.globalsecuritymag.fr/appel-a-communication-15eme-edition-des-gsdays-28-janvier-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8474528 False Conference None 3.0000000000000000 Global Security Mag - Site de news francais Février 2025 Calendrier ]]> 2024-04-01T20:00:00+00:00 https://www.globalsecuritymag.fr/fevrier-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472638 False Conference None 3.0000000000000000 Global Security Mag - Site de news francais Mars 2025 calendrier
3 - 5 mars - Sydney ( Australie) Gartner Security & Risk Management Summit www.gartner.com/en/conferences/apac/security-risk-management-australia 5 - 6 mars - Barcelone (Espagne) Mobile World Congress www.mobileworldcongress.com 11 - 13 mars - Baton Rouge - Louisiane (USA) Critical Infrastructure Protection & Resilience North America www.ciprna-expo.com 12 - 13 mars - Londres (UK) Cloud Expo Europe & Data Centre World & Smart IOT Lieu : Centre d\'exposition d\'ExCel (...) - Calendrier ]]>
2024-04-01T19:30:00+00:00 https://www.globalsecuritymag.fr/mars-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472639 False Mobile,Cloud,Conference None 3.0000000000000000
Global Security Mag - Site de news francais Mars 2025<br>March 2025 intime
3 - 5 March - Sydney ( Australia) Gartner Security & Risk Management Summit www.gartner.com/en/conferences/apac/security-risk-management-australia 5 - 6 March - Barcelona (Spain) Mobile World Congress www.mobileworldcongress.com 11 - 13 mars - Baton Rouge - Louisiane (USA) Critical Infrastructure Protection & Resilience North America www.ciprna-expo.com 12 - 13 March - London (UK) Cloud Expo Europe & Data Centre World & Smart IOT Place: Centre d\'exposition d\'ExCel (...) - Diary]]>
2024-04-01T19:15:00+00:00 https://www.globalsecuritymag.fr/march-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8472822 False Mobile,Cloud,Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future Les législateurs ont jeté des vues sur la minimisation des données alors que les États cherchent à limiter les entreprises à capturer de grandes quantités d'informations personnelles<br>Lawmakers set sights on data minimization as states seek to limit companies from capturing vast amounts of personal info Un projet de loi complet sur la confidentialité des données qui inclut les normes de minimisation les plus difficiles du pays est sur le point d'adopter la législature de l'État du Maryland, donnant aux défenseurs de l'espoir que des projets de loi similaires suivront à l'échelle nationale.Le Maryland Online Data Privacy Act a adopté à la fois la Chambre et le Sénat de l'État et se rendront bientôt à un comité de conférence
A comprehensive data privacy bill that includes the country\'s toughest data minimization standards is on the cusp of passing the Maryland state legislature, giving advocates hope that similar bills will follow nationwide. The Maryland Online Data Privacy Act has passed both the state\'s House and Senate, and will soon go to a conference committee]]>
2024-03-27T14:31:53+00:00 https://therecord.media/lawmakers-set-sights-on-data-minimization-with-new-bills www.secnews.physaphae.fr/article.php?IdArticle=8471419 False Conference None 3.0000000000000000
Global Security Mag - Site de news francais 21 - 23 mai: le Congrès de la cybersécurité de Barcelone réunira les meilleures solutions pour arrêter les cyberattaques<br>21 - 23 May: The Barcelona Cybersecurity Congress will bring together the best solutions to stop cyber-attacks événements
The Barcelona Cybersecurity Congress will bring together the best solutions to stop cyber-attacks - EVENTS]]>
2024-03-21T12:26:29+00:00 https://www.globalsecuritymag.fr/21-23-may-the-barcelona-cybersecurity-congress-will-bring-together-the-best.html www.secnews.physaphae.fr/article.php?IdArticle=8467895 False Conference CCleaner 3.0000000000000000
Global Security Mag - Site de news francais 15 avril 2024, 18 h 00 - 20 h 00 via Zoom "Lundi de la cybersécurité" : Le facteur humain dans la cyber protection, Allié ou adversaire ? Événements]]> 2024-03-21T09:32:31+00:00 https://www.globalsecuritymag.fr/15-avril-2024-18-h-00-20-h-00-via-zoom-lundi-de-la-cybersecurite-le-facteur.html www.secnews.physaphae.fr/article.php?IdArticle=8467809 False Conference None 3.0000000000000000 IndustrialCyber - cyber risk firms for industrial CS4CA US Summit 2024 rassemble des leaders de la sécurité et des OT pour la protection des infrastructures critiques<br>​​CS4CA US Summit 2024 brings together IT and OT security leaders for critical infrastructure protection Following the recent S4x24 event, the cybersecurity industry will converge once again at the upcoming 12th annual Cyber... ]]> 2024-03-18T17:37:51+00:00 https://industrialcyber.co/events/cs4ca-us-summit-2024-brings-together-it-and-ot-security-leaders-for-critical-infrastructure-protection/ www.secnews.physaphae.fr/article.php?IdArticle=8466193 False Industrial,Conference None 3.0000000000000000 Global Security Mag - Site de news francais 30 avril Toulouse : Thales Roadshow 2024 : " Unlock your Cyber ! " Événements / ]]> 2024-03-18T16:52:30+00:00 https://www.globalsecuritymag.fr/30-avril-toulouse-thales-roadshow-2024-unlock-your-cyber.html www.secnews.physaphae.fr/article.php?IdArticle=8466206 False Conference None 3.0000000000000000 Cisco - Security Firm Blog Inscrivez-vous à une tournée à la RSA Conference 2024 SOC<br>Sign up for a Tour at the RSA Conference 2024 SOC Join the guided tour outside the Security Operations Center, where we\'ll discuss real time network traffic of the RSA Conference.]]> 2024-03-18T12:00:59+00:00 https://feedpress.me/link/23535/16623025/sign-up-for-a-tour-at-the-rsa-conference-2024-soc www.secnews.physaphae.fr/article.php?IdArticle=8465998 False Conference None 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Confronté à la menace de piratage chinois, les pros de la cybersécurité industrielle Demandent: Quoi de neuf?<br>Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new? Lors de la plus grande conférence sur la cybersécurité industrielle du monde \\, les opérations de Pékin \\ ciblant l'infrastructure critique américaine n'étaient qu'une préoccupation parmi beaucoup.
>At the world\'s largest industrial cybersecurity conference, Beijing\'s operations targeting U.S. critical infrastructure was just one concern among many. ]]>
2024-03-15T20:23:25+00:00 https://cyberscoop.com/s4x24-volt-typhoon-critical-infrastructure/ www.secnews.physaphae.fr/article.php?IdArticle=8464533 False Threat,Industrial,Conference None 3.0000000000000000
Global Security Mag - Site de news francais Cyber Show Paris, le nouvel évènement phare de la cybersécurité en France – dédié à la démonstration des solutions cyber pour tous les publics - se tiendra les 29 et 30 mai 2024 à Paris Événements]]> 2024-03-13T10:00:00+00:00 https://www.globalsecuritymag.fr/cyber-show-paris-le-nouvel-evenement-phare-de-la-cybersecurite-en-france-dedie.html www.secnews.physaphae.fr/article.php?IdArticle=8462843 False Conference None 3.0000000000000000 GoogleSec - Firm Security Blog Programme de récompense de vulnérabilité: 2023 Année en revue<br>Vulnerability Reward Program: 2023 Year in Review Bonus Awards program, we now periodically offer time-limited, extra rewards for reports to specific VRP targets. We expanded our exploit reward program to Chrome and Cloud through the launch of v8CTF, a CTF focused on V8, the JavaScript engine that powers Chrome. We launched Mobile VRP which focuses on first-party Android applications. Our new Bughunters blog shared ways in which we make the internet, as a whole, safer, and what that journey entails. Take a look at our ever-growing repository of posts! To further our engagement with top security researchers, we also hosted our yearly security conference ESCAL8 in Tokyo. It included live hacking events and competitions, student training with our init.g workshops, and talks from researchers and Googlers. Stay tuned for details on ESCAL8 2024. As in past years, we are sharing our 2023 Year in Review statistics across all of our programs. We would like to give a special thank you to all of our dedicated researchers for their continued work with our programs - we look forward to more collaboration in the future! Android and Google Devices In 2023, the Android VRP achieved significant milestones, reflecting our dedication to securing the Android ecosystem. We awarded over $3.4 million in rewards to researchers who uncovered remarkable vulnerabilities within Android]]> 2024-03-12T11:59:14+00:00 http://security.googleblog.com/2024/03/vulnerability-reward-program-2023-year.html www.secnews.physaphae.fr/article.php?IdArticle=8469137 False Vulnerability,Threat,Mobile,Cloud,Conference None 3.0000000000000000 Global Security Mag - Site de news francais Février 2025<br>February 2025 intime
10 - 12 February - Denvers (USA) Geo Week Geo Week is the intersection of geospatial + the built world. The event brings together previous event brands AEC Next, SPAR 3D and the International Lidar Mapping Forum with 4 co-located user conferences into a single powerhouse event. Industries covered include Architecture, Engineering & Construction; Asset & Facility Management; Disaster & Emergency Response; Earth Observation & Satellite Applications; Energy & Utilities, (...) - Diary]]>
2024-03-01T19:25:00+00:00 https://www.globalsecuritymag.fr/february-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8457425 False Conference None 3.0000000000000000
Cisco - Security Firm Blog Cisco Live Melbourne Soc Report This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.]]> 2024-03-01T13:00:12+00:00 https://feedpress.me/link/23535/16598184/cisco-live-melbourne-soc-report www.secnews.physaphae.fr/article.php?IdArticle=8457501 False Threat,Studies,Conference None 4.0000000000000000 Global Security Mag - Site de news francais 18 mars, 18 h 00 - 20 h 00 visioconférence : Le Cercle d\'Intelligence économique avec l\'Université Paris Cité et l\'ARCSI : Intelligence artificielle générative géniale et dangereuse Événements]]> 2024-03-01T09:11:28+00:00 https://www.globalsecuritymag.fr/18-mars-18-h-00-20-h-00-visioconference-le-cercle-d-intelligence-economique.html www.secnews.physaphae.fr/article.php?IdArticle=8457447 False Conference None 3.0000000000000000 Krebs on Security - Chercheur Américain Calendrier Meeting Links utilisés pour diffuser des logiciels malveillants Mac<br>Calendar Meeting Links Used to Spread Mac Malware Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target\'s account at Calendly, a popular free calendar application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. But clicking the meeting link provided by the scammers prompts the user to run a script that quietly installs malware on macOS systems.]]> 2024-02-28T16:56:43+00:00 https://krebsonsecurity.com/2024/02/calendar-meeting-links-used-to-spread-mac-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8456533 False Malware,Conference None 2.0000000000000000 Recorded Future - FLux Recorded Future Khan de FTC \\ avertit l'industrie technologique que l'agence appliquera strictement la confidentialité des données de l'IA<br>FTC\\'s Khan warns tech industry that agency will strictly enforce AI data privacy Les outils d'intelligence artificielle seront vigoureusement réglementés par la Federal Trade Commission (FTC), en tenant compte de la vie privée des consommateurs, a déclaré mardi sa présidente Lina Khan à un audience des dirigeants de la technologie et des fondateurs de startup lors d'une conférence."Nous réalisons des remèdes facilement administrables avec des règles de ligne lumineuse sur le développement, l'utilisation et la gestion des entrées d'IA", a déclaré Khan
Artificial intelligence tools will be vigorously regulated by the Federal Trade Commission (FTC), with an eye on consumer privacy, its Chair Lina Khan told an audience of tech executives and startup founders at a conference Tuesday. “We\'re crafting easily administrable remedies with bright-line rules on the development, use and management of AI inputs,” Khan said]]>
2024-02-27T19:12:51+00:00 https://therecord.media/ftc-warns-tech-industry-ai-data-privacy www.secnews.physaphae.fr/article.php?IdArticle=8456034 False Tool,Conference None 2.0000000000000000
Recorded Future - FLux Recorded Future L'administrateur de Lockbit \\ 's'est engagé avec les forces de l'ordre, \\' réclamation de la police<br>LockBit administrator \\'has engaged with law enforcement,\\' police claim Lockbitsupp, ou l'individu derrière ce compte représentant le service de ransomware sur les forums de la cybercriminalité, «s'est engagé avec les forces de l'ordre», a affirmé vendredi la police.Une opération dirigée par l'agence nationale de criminalité de la Grande-Bretagne (NCA) aux côtés du FBI, de l'Europol et d'autres partenaires internationaux, Le site DarkNet de Lockbit \\ a saisi lundi.Lors d'une conférence de presse à Londres, mardi matin,
LockbitSupp, or the individual behind that account representing the ransomware service on cybercrime forums, “has engaged with law enforcement,” police claimed on Friday. An operation led by Britain\'s National Crime Agency (NCA) alongside the FBI, Europol, and other international partners, seized LockBit\'s darknet website on Monday. During a press conference in London on Tuesday morning,]]>
2024-02-23T16:50:43+00:00 https://therecord.media/lockbit-administrator-engaging-with-police www.secnews.physaphae.fr/article.php?IdArticle=8454193 False Ransomware,Conference None 3.0000000000000000
Global Security Mag - Site de news francais 6 - 8 mai 2024: Produits numériques Cyber Certification Events pour aborder l'évolution des programmes fédéraux américains<br>6 - 8 May 2024: Digital Product Cyber Certification Events to Address Evolving US Federal Programs événements
Digital Product Cyber Certification Events to Address Evolving US Federal Programs - EVENTS]]>
2024-02-23T07:43:08+00:00 https://www.globalsecuritymag.fr/6-8-may-2024-digital-product-cyber-certification-events-to-address-evolving-us.html www.secnews.physaphae.fr/article.php?IdArticle=8454030 False Conference None 3.0000000000000000
Global Security Mag - Site de news francais Nokia annonce l'assistant Genai intégré au dôme de cybersécurité Netguard pour renforcer la protection du réseau<br>Nokia announces GenAI assistant integrated with NetGuard Cybersecurity Dome to strengthen network protection revues de produits
Nokia announces GenAI assistant integrated with NetGuard Cybersecurity Dome to strengthen network protection #MWC24 • Nokia NetGuard Cybersecurity Dome integrated with telco-centric GenAI assistant helps customers more quickly detect and eliminate cyber threats. • New telco focused GenAI assistant is based on Microsoft Azure OpenAI Service with telecommunications and mission critical security training. - Product Reviews]]>
2024-02-21T13:17:10+00:00 https://www.globalsecuritymag.fr/nokia-announces-genai-assistant-integrated-with-netguard-cybersecurity-dome-to.html www.secnews.physaphae.fr/article.php?IdArticle=8453218 False General Information,Conference None 2.0000000000000000
CyberSecurityVentures - cybersecurity services Google lance \\ 'AI Cyber Defense Initiative \\' à la Conférence de sécurité de Munich<br>Google Launches \\'AI Cyber Defense Initiative\\' At The Munich Security Conference This week in cybersecurity from the editors at Cybercrime Magazine – Listen to the Cybercrime Magazine Interview Sausalito, Calif. – Feb. 17, 2024 Google’s ‘AI Cyber Defense Initiative,’ launched at the Munich Security Conference on Feb. 16, signals a belief that the company’s experience in ]]> 2024-02-17T14:49:01+00:00 https://cybersecurityventures.com/google-launches-ai-cyber-defense-initiative-at-the-munich-security-conference/ www.secnews.physaphae.fr/article.php?IdArticle=8451457 False Conference None 2.0000000000000000 Recorded Future - FLux Recorded Future La Norvège PM avertit que le conflit russe avec l'Europe ne commencera pas nécessairement dans le domaine militaire \\ '<br>Norway PM warns Russian conflict with Europe will \\'not necessarily start in the military field\\' Munich, Allemagne - Un conflit entre la Russie et d'autres États en Europe au-delà de l'Ukraine "ne commencerait pas nécessairement dans le domaine militaire", a averti le Premier ministre de Norvège \\ Jonas Gahr St & Oslash; Re à la sécurité de MunichConférence le samedi.Lors d'une table ronde sur la défense européenne, parlant aux côtés d'Ursula von der Leyen, le président de la Commission européenne,
MUNICH, GERMANY - A conflict between Russia and other states in Europe beyond Ukraine would “not necessarily start in the military field,” warned Norway\'s Prime Minister Jonas Gahr Støre at the Munich Security Conference on Saturday. During a panel discussion about European defense, speaking alongside Ursula von der Leyen, the president of the European Commission,]]>
2024-02-17T11:52:13+00:00 https://therecord.media/norway-pm-warns-russian-conflict-with-europe-may-not-start-with-military www.secnews.physaphae.fr/article.php?IdArticle=8451393 False Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future Zelensky: Nous devons faire à nouveau la sécurité une réalité<br>Zelensky: We must make security a reality again Munich, Allemagne - Le président ukrainien Volodymyr Zelensky a appelé les nations à unir leurs efforts contre la Russie pour restaurer le «Ordre mondial basé sur les règles» et faire de la sécurité «une réalité à nouveau».S'exprimant samedi à la scène principale de la Conférence de sécurité de Munich, Zelensky a déclaré que la guerre russe en Ukraine imposait une menace pour le monde entier
MUNICH, GERMANY - Ukrainian President Volodymyr Zelensky called on nations to unite their efforts against Russia to restore the “rule-based world order” and make security “a reality again.” Speaking from the main stage at the Munich Security Conference on Saturday, Zelensky said that the Russian war in Ukraine poses a threat to the whole world]]>
2024-02-17T11:09:27+00:00 https://therecord.media/zelensky-msc-speech-make-security-a-reality www.secnews.physaphae.fr/article.php?IdArticle=8451394 False Threat,Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future L'ancien chef de la NSA appelle à une approche alternative à la cyber-défense<br>Former NSA chief calls for alternative approach to cyber defense Les États-Unis et ses alliés doivent prendre du recul et réévaluer les stratégies qui travaillent dans le cyber et ce qui doit être modifié, selon Michael Rogers, ancien directeur de l'Agence américaine de sécurité nationale.S'adressant au public à la Conférence de cybersécurité de Munich vendredi, Rogers a déclaré qu'avec les pays occidentaux qui connaissaient des niveaux record
The U.S. and its allies need to step back and reassess which strategies are working in cyber and what needs to be changed, according to Michael Rogers, former director of the U.S. National Security Agency. Addressing the audience at the Munich Cyber Security Conference on Friday, Rogers said that with Western countries experiencing record levels]]>
2024-02-16T21:47:00+00:00 https://therecord.media/former-nsa-chief-alternative-approach-cyber www.secnews.physaphae.fr/article.php?IdArticle=8451116 False Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future Le Japon voit des cyber-étanches accrues aux infrastructures critiques, en particulier en provenance de la Chine<br>Japan sees increased cyberthreats to critical infrastructure, particularly from China Munich, Allemagne - Les pirates soutenus par la Chine visent de plus en plus des transporteurs de télécommunications, des fournisseurs d'Internet et d'autres infrastructures critiques au Japon, selon Kazutaka Nakamizo, directrice adjointe du Centre national de préparation et d'incidence du pays \\ du pays \\Stratégie de cybersécurité (NISC).Lors de la conférence de la cybersécurité de Munich vendredi, Nakamizo a déclaré que le nombre de cyber-incidents, y compris ceux
MUNICH, Germany - China-backed hackers are increasingly targeting telecom carriers, internet providers and other critical infrastructure in Japan, according to Kazutaka Nakamizo, deputy director of the country\'s National Center of Incident Readiness and Strategy for Cybersecurity (NISC). During the Munich Cyber Security Conference on Friday, Nakamizo said that the number of cyber incidents, including those]]>
2024-02-16T12:42:18+00:00 https://therecord.media/japan-critical-infrastructure-cyberthreats www.secnews.physaphae.fr/article.php?IdArticle=8450984 False Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future Utiliser l'IA dans une cyberattaque?Monaco de Doj \\ dit que les criminels seront confrontés à des phrases plus rigides<br>Using AI in a cyberattack? DOJ\\'s Monaco says criminals will face stiffer sentences Munich, Allemagne - Le fonctionnaire n ° 2 du ministère de la Justice a ordonné aux procureurs fédéraux d'imposer des sanctions plus strictes aux cybercriminels qui utilisent l'IA dans leurs crimes."Nous devons mettre l'IA au sommet de [notre] liste de priorités d'application", a déclaré Lisa Monaco à un public vendredi lors de la conférence de la cybersécurité de Munich.«Nous regardons assez fort comment
MUNICH, Germany - The Justice Department\'s No. 2 official directed federal prosecutors to impose stiffer penalties on cybercriminals who use AI in their crimes. “We have to put AI at the top of [our] enforcement priorities list,” Lisa Monaco told an audience Friday at the Munich Cyber Security Conference. “We\'re looking quite hard at how]]>
2024-02-16T12:21:32+00:00 https://therecord.media/ai-cybercrime-sentencing-guidelines-lisa-monaco-munich www.secnews.physaphae.fr/article.php?IdArticle=8450985 False Conference None 2.0000000000000000
Recorded Future - FLux Recorded Future Le \\ 'Munich Spirit \\': à quoi s'attendre des conférences de sécurité de cette année<br>The \\'Munich Spirit\\': What to expect from this year\\'s security conferences Munich, l'une des plus grandes villes d'Allemagne enterrée au plus profond de la Bavière dans le sud du pays, accueillera cette semaine le plus grand rassemblement de travail sur la planète des présidents, des ministres supérieurs, des diplomates et des responsables de la défense et du renseignement.La Munich Security Conference (MSC) en est maintenant à sa 60e année et se déroulera du vendredi au dimanche.La plupart de
Munich, one of Germany\'s largest cities buried deep in Bavaria in the country\'s south, will this week host the largest working gathering on the planet of presidents, senior ministers, diplomats, and defense and intelligence officials. The Munich Security Conference (MSC) is now in its 60th year and will run from Friday until Sunday. Most of]]>
2024-02-14T17:00:00+00:00 https://therecord.media/munich-security-and-cybersecurity-conference-2024-what-to-expect www.secnews.physaphae.fr/article.php?IdArticle=8450065 False Conference None 2.0000000000000000
Recorded Future - FLux Recorded Future Le plus grand opérateur de télécommunications du PDG de l'Ukraine décrit la cyberattaque russe qui a essuyé des milliers d'ordinateurs<br>CEO of Ukraine\\'s largest telecom operator describes Russian cyberattack that wiped thousands of computers Au cours des deux mois qui ont suivi des pirates liés à la Russie, les pirates d'opérateurs de télécommunications d'Ukraine \\ ont émergé sur la façon dont ils ont accédé aux systèmes de la société et y sont restés, probablement pendant des mois, non détectés.Lors d'une conférence de cybersécurité à Kiev cette semaine, le PDG de Kievstar, Oleksandr Komarov, a mis en lumière ce qui s'est passé pendant l'attaque qui a laissé
In the two months since Russia-linked hackers attacked Ukraine\'s largest telecom operator, many questions have emerged about how they gained access to the company\'s systems and lingered there, likely for months, undetected. During a cybersecurity conference in Kyiv this week, Kyivstar CEO Oleksandr Komarov shed some light on what happened during the attack that left]]>
2024-02-09T17:20:00+00:00 https://therecord.media/kyivstar-ceo-on-russian-cyberattack-telecom www.secnews.physaphae.fr/article.php?IdArticle=8448447 False Conference None 4.0000000000000000
Global Security Mag - Site de news francais 11-13 mars à Bruxelles: les dirigeants mondiaux de l'industrie et de l'agence gouvernementale se réunissent pour naviguer dans de nouvelles réglementations de cybersécurité<br>11-13 March at Brussels: Global Industry and Government Agency Leaders Convene to Navigate New Cybersecurity Regulations événements
Global Industry and Government Agency Leaders Convene to Navigate New Cybersecurity Regulations - EVENTS]]>
2024-02-08T22:00:09+00:00 https://www.globalsecuritymag.fr/11-13-march-at-brussels-global-industry-and-government-agency-leaders-convene.html www.secnews.physaphae.fr/article.php?IdArticle=8448168 False Conference None 3.0000000000000000
TrendLabs Security - Editeur Antivirus Un Deepfake a arnaqué une banque sur 25 millions de dollars - quoi?<br>A Deepfake Scammed a Bank out of $25M - Now What? A finance worker in Hong Kong was tricked by a deepfake video conference. The future of defending against deepfakes is as much as human challenge as a technological one.]]> 2024-02-07T00:00:00+00:00 https://www.trendmicro.com/en_us/research/24/b/deepfake-video-calls.html www.secnews.physaphae.fr/article.php?IdArticle=8447797 False Conference None 2.0000000000000000 Recorded Future - FLux Recorded Future Gouvernement israélien absent de la conférence et de l'engagement de Londres Spyware<br>Israeli government absent from London spyware conference and pledge Les responsables du gouvernement israélien n'assistent pas à une conférence à Londres cette semaine axée sur la lutte contre les abus des logiciels espions, malgré la part importante du marché du pays, selon une liste des participants vus par les nouvelles enregistrées.Organisé conjointement par le Royaume-Uni et la France, la Cyber Conference de Lancaster House entend
Officials from the Israeli government are not attending a conference in London this week focused on tackling the abuses of spyware, despite the country\'s significant share of the export market, according to a list of attendees seen by Recorded Future News. Jointly hosted by the United Kingdom and France, the Lancaster House cyber conference intends]]>
2024-02-06T13:09:44+00:00 https://therecord.media/israel-absent-from-london-spyware-conference-and-pledge www.secnews.physaphae.fr/article.php?IdArticle=8447285 False Hack,Conference None 3.0000000000000000
Recorded Future - FLux Recorded Future La Grande-Bretagne et la France rassemblent des diplomates pour un accord international sur les logiciels espions<br>Britain and France assemble diplomats for international agreement on spyware Le Royaume-Uni et la France organisent conjointement une conférence diplomatique à Lancaster House à Londres cette semaine pour lancer un nouvel accord international concernant «la prolifération des outils commerciaux de cyber-intrusion».Selon le ministère des Affaires étrangères, 35 nations seront représentées lors de la conférence, aux côtés de «Big Tech Leaders, d'experts juridiques et de droits de l'homme
The United Kingdom and France are to jointly host a diplomatic conference at Lancaster House in London this week to launch a new international agreement addressing “the proliferation of commercial cyber intrusion tools.” According to the Foreign Office, 35 nations will be represented at the conference, alongside “big tech leaders, legal experts, and human rights]]>
2024-02-05T23:00:35+00:00 https://therecord.media/britain-france-assemble-diplomats-international-agreement www.secnews.physaphae.fr/article.php?IdArticle=8447092 False Tool,Conference,Commercial None 2.0000000000000000
Schneier on Security - Chercheur Cryptologue Américain Fraude profonde<br>Deepfake Fraud a trompé un travailleur financier pour envoyer 25 millions de dollars aux criminels & # 8217;compte.
A deepfake video conference call—with everyone else on the call a fake—fooled a finance worker into sending $25M to the criminals’ account.]]>
2024-02-05T16:10:13+00:00 https://www.schneier.com/blog/archives/2024/02/deepfake-fraud.html www.secnews.physaphae.fr/article.php?IdArticle=8446976 False Conference None 2.0000000000000000
Global Security Mag - Site de news francais Sans Institute a annoncé Sans Abu Dhabi en février 2024<br>SANS Institute has announced SANS Abu Dhabi February 2024 sans institut
SANS Institute to Enhance Middle East Cyber Defense with SANS Abu Dhabi February 2024 Expert instructors from SANS Institute will host specialized training in ICS security, as well as the latest threat hunting and incident response tactics in the Gulf Region - SANS INSTITUTE]]>
2024-02-05T09:11:49+00:00 https://www.globalsecuritymag.fr/sans-institute-has-announced-sans-abu-dhabi-february-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8446859 False Threat,Industrial,Conference None 3.0000000000000000
Team Cymru - Equipe de Threat Intelligence Navigation des frontières de cybersécurité au Rwanda: dévoiler l'agenda de la conférence Rise \\<br>Navigating Cybersecurity Frontiers in Rwanda: Unveiling the RISE Conference\\'s Agenda Why you need to attend the RISE 2024 Conference In the rapidly evolving digital era, cybersecurity remains a paramount concern,...]]> 2024-02-02T13:34:15+00:00 https://www.team-cymru.com/post/navigating-cybersecurity-frontiers-in-rwanda-unveiling-the-rise-conference-s-agenda www.secnews.physaphae.fr/article.php?IdArticle=8445981 False Conference None 3.0000000000000000 Silicon - Site de News Francais FOSDEM 2024 : quelques sessions à suivre 2024-02-01T11:23:36+00:00 https://www.silicon.fr/fosdem-2024-sessions-a-suivre-475481.html www.secnews.physaphae.fr/article.php?IdArticle=8445532 False Conference None 3.0000000000000000 Schneier on Security - Chercheur Cryptologue Américain Les canaux latéraux sont communs<br>Side Channels Are Common prêtez-moi votre oreille: canaux latéraux physiques à distance passifs sur PC . & # 8221; Résumé: Nous montrons que les capteurs intégrés dans les PC de produits de base, tels que les microphones, capturent par inadvertance la fuite électromagnétique du canal latéral à partir du calcul continu.De plus, ces informations sont souvent véhiculées par des canaux supposés-benons tels que les enregistrements audio et les applications de voix sur IP courantes, même après compression avec perte. Ainsi, nous montrons, il est possible de mener des attaques de canaux latéraux physiques sur le calcul par analyse à distance et purement passive des canaux couramment partagés.Ces attaques ne nécessitent ni proximité physique (qui pourrait être atténuée par la distance et le blindage), ni la possibilité d'exécuter du code sur la cible ou de configurer son matériel.Par conséquent, nous soutenons que les canaux latéraux physiques sur les PC ne peuvent plus être exclus des modèles de menaces à distance à distance ...
Really interesting research: “Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ongoing computation. Moreover, this information is often conveyed by supposedly-benign channels such as audio recordings and common Voice-over-IP applications, even after lossy compression. Thus, we show, it is possible to conduct physical side-channel attacks on computation by remote and purely passive analysis of commonly-shared channels. These attacks require neither physical proximity (which could be mitigated by distance and shielding), nor the ability to run code on the target or configure its hardware. Consequently, we argue, physical side channels on PCs can no longer be excluded from remote-attack threat models...]]>
2024-01-23T12:09:42+00:00 https://www.schneier.com/blog/archives/2024/01/side-channels-are-common.html www.secnews.physaphae.fr/article.php?IdArticle=8442077 False Threat,Conference None 4.0000000000000000
Global Security Mag - Site de news francais 8 février 2024 - Événement IT : Le BUSINESS CONNECT DAY se tiendra sur Tours Événements]]> 2024-01-23T11:01:49+00:00 https://www.globalsecuritymag.fr/8-fevrier-2024-evenement-it-le-business-connect-day-se-tiendra-sur-tours.html www.secnews.physaphae.fr/article.php?IdArticle=8442058 False Cloud,Conference None 3.0000000000000000 Global Security Mag - Site de news francais 23-25 avril 2024: Gulf Information Security Expo and Conference (GISEC Global) & # 8211;L'événement Super Connecteur pour la communauté de cybersécurité du Moyen-Orient et de l'Afrique \\<br>23-25 April 2024: Gulf Information Security Expo and Conference (GISEC Global) – the super connector event for Middle East and Africa\\'s Cybersecurity Community événements
23-25 April 2024: Gulf Information Security Expo and Conference (GISEC Global) – the super connector event for Middle East and Africa\'s Cybersecurity Community - EVENTS]]>
2024-01-18T08:42:35+00:00 https://www.globalsecuritymag.fr/23-25-april-2024-gulf-information-security-expo-and-conference-gisec-global-the.html www.secnews.physaphae.fr/article.php?IdArticle=8440193 False Conference None 3.0000000000000000
Dark Reading - Informationweek Branch L'avenir de celui-ci: Info-Tech Live 2024 Conférence annoncée pour septembre<br>The Future of IT: Info-Tech LIVE 2024 Conference Announced for September Info-Tech Research Group has announced the return of Info-Tech LIVE for 2024, an event for IT leaders, exhibitors, and media to explore emerging technology trends and innovative insights.]]> 2024-01-11T23:14:00+00:00 https://www.darkreading.com/cybersecurity-operations/the-future-of-it-info-tech-live-2024-conference-announced-for-september- www.secnews.physaphae.fr/article.php?IdArticle=8438050 False Conference None 3.0000000000000000 Recorded Future - FLux Recorded Future DOJ au tempo des opérations de cybercriminalité en 2024, dit un haut fonctionnaire<br>DOJ to up tempo of cybercrime operations in 2024, senior official says Après un an de bustes de cybercriminalité très médiatisés, un haut responsable du ministère de la Justice a déclaré mardi qu'il s'attendait à ce que davantage arrive en 2024. Lors de la 10e conférence internationale sur la cybersécurité à New York cette semaine, plusieurs procureurs du département de la justice ont parlé de la cybersécuritéTendances tout au long de 2023 et ce que cette année pourrait apporter."JE
After a year of high-profile cybercrime busts, a senior Justice Department official said Tuesday that he expects more to come in 2024. At the 10th International Conference on Cybersecurity in New York City this week, several top prosecutors within the Justice Department spoke about cybersecurity trends throughout 2023 and what this year may bring. “I]]>
2024-01-09T21:30:00+00:00 https://therecord.media/doj-to-increase-cybercrime-efforts www.secnews.physaphae.fr/article.php?IdArticle=8437312 False Conference None 2.0000000000000000
Microsoft - Microsoft Security Response Center L'appel de Bluehat India pour les papiers est maintenant ouvert!<br>BlueHat India Call for Papers is Now Open! You asked for it and it\'s finally here! The inaugural BlueHat India conference will be held April 18-19, 2024, in Hyderabad, India! This intimate conference will bring together a unique blend of security researchers and responders, who come together as peers to exchange ideas, experiences, and learnings in the interest of creating a safer and more secure world for all.]]> 2024-01-08T00:00:00+00:00 https://msrc.microsoft.com/blog/2024/01/bluehat-india-call-for-papers-is-now-open/ www.secnews.physaphae.fr/article.php?IdArticle=8437005 False Conference None 2.0000000000000000 Global Security Mag - Site de news francais Novembre 2024 Calendrier ]]> 2024-01-01T20:00:00+00:00 https://www.globalsecuritymag.fr/Novembre-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8431958 True Conference None 3.0000000000000000 Global Security Mag - Site de news francais Décembre 2024 Calendrier ]]> 2024-01-01T19:55:00+00:00 https://www.globalsecuritymag.fr/decembre-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8431414 True Conference None 2.0000000000000000 Global Security Mag - Site de news francais November 2024 intime
11 - 14 November - Lisbon (Portugal) Web Summit https://websummit.com/ 12 - 14 November - Prague (Czech Republic) Infrastructure Protection & Resilience Europe (CIPRE) conference www.cipre-expo.com/ 14 November - London (UK) Technology Live! London https://a3communicationspr.com/homepage/events/technology-live/ 19 - 21 November - Rennes (France) European Cyber Week https://www.european-cyber-week.eu/ 20 - 21 November - Dublin (Ireland) Salon Datacenters Ireland (...) - Diary]]>
2024-01-01T19:40:00+00:00 https://www.globalsecuritymag.fr/November-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8431959 False Conference None 3.0000000000000000
Global Security Mag - Site de news francais Décembre 2024<br>December 2024 intime
2 - 4 December - London (UK) IFSEC ExCeL London www.ifsec.co.uk 5 December - Stockholm (Sweden) Data Center Forum https://www.datacenter-forum.com/events/stockholm/2023 9 - 11 December - Las Vegas (USA) Gartner Identity & Acess Management Summit www.gartner.com/en/conferences/na/identity-access-management-us 10 - 11 December - Reims (France) Congrès du CESIN https://cesin.fr/ 13 December - Paris Les Trophées Européens de la Femme Cyber 2024 By CEFCYS (...) - Diary]]>
2024-01-01T19:35:00+00:00 https://www.globalsecuritymag.fr/december-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8431415 False Conference None 2.0000000000000000
Checkpoint - Fabricant Materiel Securite Principales raisons d'assister au CPX 2024<br>Top Reasons to Attend CPX 2024 Qu'est-ce que CPX 2024?CPX 2024 est une conférence annuelle de cybersécurité organisée par Check Point pour les professionnels de la sécurité dans le monde entier.L'inscription est maintenant ouverte et nous vous invitons à nous rejoindre pour apprendre les dernières tendances, défis et opportunités qui façonnent la cybersécurité.Sécurisez votre place aujourd'hui et obtenez une remise des lève-tôt, valable jusqu'au 30 décembre 2023. Tirez le meilleur parti de votre expérience au CPX 2024 Apprentissage et réseautage avec plus de 100 séances, il y a quelque chose pour tout le monde au CPX 2024. Vous pouvezDans l'attente des conversations autour de l'intelligence artificielle (AI), de la confiance Zero, du service d'accès sécurisé (SASE), de la sécurité du cloud, de l'e-mail [& # 8230;]
>What is CPX 2024? CPX 2024 is an annual cyber security conference hosted by Check Point for security professionals worldwide. Registration is now open and we invite you to join us to learn the latest trends, challenges, and opportunities shaping cybersecurity. Secure your spot today and get an early bird discount, valid until December 30, 2023. Get the Most Out of Your Experience at CPX 2024 Learning and Networking With over 100 sessions, there\'s something for everyone at CPX 2024. You can look forward to conversations around artificial intelligence (AI), zero trust, secure access service edge (SASE), cloud security, email […] ]]>
2023-12-22T13:00:11+00:00 https://blog.checkpoint.com/security/top-reasons-to-attend-cpx-2024/ www.secnews.physaphae.fr/article.php?IdArticle=8427388 False Cloud,Conference None 2.0000000000000000
AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC La meilleure conférence de cybersécurité dont vous n'avez jamais entendu parler<br>The best Cybersecurity conference you never heard of OWASP (the Open Worldwide Application Security Project) chapter. OWASP is a volunteer organization that is a treasure trove of application security information with things such as standards, discussion groups, documentation, and more. The organization tracks the annual OWASP Top 10 web application security risks and is the proverbial north star for developers seeking more secure coding practices. LASCON 2023 talks are recorded and available. As a conference, LASCON rolls up its metaphorical sleeves and puts on a fabulous show. The uniqueness of LASCON: Delivers exceptional content focused on application security Offers every attendee the opportunity to challenge themselves and gain new life skills Provides physical and cerebral entertainment Exceptional content LASCON is wholly committed to discussing, exploring, and showcasing application security. Check out the 2023 agenda here to see the extensive programming focused on application security. Why is application security so important? In the world of cybersecurity, the subset of application security is the last mile and the area the adversaries know may be less security-aware. Software is malleable and widely shared. In many cases software developers live in an environment of “just ship it” only to find that unintentional vulnerabilities crept into a production release. The push to “DevSecOps” or “SecDevOps” means security disciplines are being incorporated from the beginning to alleviate many of the problems that stem from a “just ship it” environment. LASCON tackles the what, why, and how of application security. In 2023, there was plenty of focus on the needs and benefits of automation, how development teams need to communicate to different audiences, and of course what generative-AI means for application security. In other words, something for everyone. Many of the LASCON sessions were recorded and the replays will be available in the next few months. I highly recommend viewing this topical content. New life skills Similar to other conferences, LASCON has an expo hall where sponsor-vendors showcase their technology and give away swag. But…LASCON goes a step further and brings in the Longhorn Lock Picking Club to set up Lock Pick Village in one end of the expo hall. Lock Pick Village focuses on locksport. This skill uses logical thinking, involves manual dexterity, and brings out the physical aspect of security. Lock Pick Village is a favorite among attendees and creates a bonding opportunity at LASCON. The mayor of Lock Pick Village runs various contests throughout the two days of the conference with winners walking away with bragging rights. lockpick village Entertainment LASCON has something for everyone! Each year, the LASCON organizing team hosts “speed debates”. These debates are sarcastic, outlandish, and just plain funny. A moderator hosts two teams who take on cybersecurity topics of the day and present heartfelt pro or con arguments. Topics are far-ranging and incl]]> 2023-12-19T11:00:00+00:00 https://cybersecurity.att.com/blogs/security-essentials/the-best-cybersecurity-conference-you-never-heard-of www.secnews.physaphae.fr/article.php?IdArticle=8425386 False Vulnerability,Conference None 3.0000000000000000 ProofPoint - Cyber Firms Une approche de risque intégrée pour briser la chaîne d'attaque juridique et de conformité: les informations de Proofpoint Protect 2023<br>An Integrated Risk Approach to Breaking the Legal and Compliance Attack Chain: Insights from Proofpoint Protect 2023 2023-12-18T06:00:21+00:00 https://www.proofpoint.com/us/blog/compliance-and-archiving/integrated-risk-approach-breaking-legal-and-compliance-attack-chain www.secnews.physaphae.fr/article.php?IdArticle=8425108 False Tool,Threat,Mobile,Prediction,Conference None 3.0000000000000000 GoogleSec - Firm Security Blog Durcissant les bandes de base cellulaire dans Android<br>Hardening cellular basebands in Android prioritize hardening the cellular baseband given its unique combination of running in an elevated privilege and parsing untrusted inputs that are remotely delivered into the device. This post covers how to use two high-value sanitizers which can prevent specific classes of vulnerabilities found within the baseband. They are architecture agnostic, suitable for bare-metal deployment, and should be enabled in existing C/C++ code bases to mitigate unknown vulnerabilities. Beyond security, addressing the issues uncovered by these sanitizers improves code health and overall stability, reducing resources spent addressing bugs in the future. An increasingly popular attack surface As we outlined previously, security research focused on the baseband has highlighted a consistent lack of exploit mitigations in firmware. Baseband Remote Code Execution (RCE) exploits have their own categorization in well-known third-party marketplaces with a relatively low payout. This suggests baseband bugs may potentially be abundant and/or not too complex to find and exploit, and their prominent inclusion in the marketplace demonstrates that they are useful. Baseband security and exploitation has been a recurring theme in security conferences for the last decade. Researchers have also made a dent in this area in well-known exploitation contests. Most recently, this area has become prominent enough that it is common to find practical baseband exploitation trainings in top security conferences. Acknowledging this trend, combined with the severity and apparent abundance of these vulnerabilities, last year we introduced updates to the severity guidelines of Android\'s Vulnerability Rewards Program (VRP). For example, we consider vulnerabilities allowing Remote Code Execution (RCE) in the cellular baseband to be of CRITICAL severity. Mitigating Vulnerability Root Causes with Sanitizers Common classes of vulnerabilities can be mitigated through the use of sanitizers provided by Clang-based toolchains. These sanitizers insert runtime checks against common classes of vulnerabilities. GCC-based toolchains may also provide some level of support for these flags as well, but will not be considered further in this post. We encourage you to check your toolchain\'s documentation. Two sanitizers included in Undefine]]> 2023-12-12T12:00:09+00:00 http://security.googleblog.com/2023/12/hardening-cellular-basebands-in-android.html www.secnews.physaphae.fr/article.php?IdArticle=8421613 False Tool,Vulnerability,Threat,Mobile,Prediction,Conference None 3.0000000000000000 Amensty International - International Orgs Émirats arabes unis: préoccupations concernant les autorités \\ 'Utilisation de la surveillance numérique pendant la COP28<br>UAE: Concerns around authorities\\' use of digital surveillance during COP28 Avant la conférence COP28 Climate, qui commence à Dubaï le 30 novembre, Rebecca White, militante de l'équipe de surveillance de perturbation d'Amnesty International, a déclaré: «Ce n'est pas un secret que la surveillance numérique ciblée a depuis longtemps été & # 160; armée & #160; aux Émirats arabes unis pour écraser la dissidence et étouffer la liberté d'expression.Avant son arrestation en 2017, le défenseur des droits de l'homme & # 160; Ahmed [& # 8230;]
>Ahead of the COP28 climate conference, which begins in Dubai on 30 November, Rebecca White, Campaigner at Amnesty International\'s Disrupting Surveillance Team, said: “It is no secret that targeted digital surveillance has long been weaponized in the United Arab Emirates to crush dissent and stifle freedom of expression. Prior to his arrest in 2017, human rights defender Ahmed […] ]]>
2023-12-07T14:56:56+00:00 https://securitylab.amnesty.org/latest/2023/12/uae-concerns-around-authorities-use-of-digital-surveillance-during-cop28/ www.secnews.physaphae.fr/article.php?IdArticle=8419907 False Conference None 3.0000000000000000
SecurityWeek - Security News Événement virtuel aujourd'hui: Cyber AI & Automation Summit<br>Virtual Event Today: Cyber AI & Automation Summit Virtual conference on December 6th will explore cybersecurity use-cases for artificial intelligence (AI) technology and the race to protect LLM algorithms from adversarial use. ]]> 2023-12-06T11:00:00+00:00 https://www.securityweek.com/virtual-event-today-cyber-ai-automation-summit/ www.secnews.physaphae.fr/article.php?IdArticle=8419535 False Conference None 3.0000000000000000 Global Security Mag - Site de news francais 04 juin 2024 Istanbul - Turquie - Conférence et exposition d'Enbantec en cybersécurité<br>04 June 2024 Istanbul - Turkey - ENBANTEC Cyber Security Conference and Exhibition konferenzen und webinare

ENBANTEC Cyber Security Conference and Exhibition will be held on 04 June 2024 in Istanbul, Turkey. ENBANTEC is a global conference which is one of the most important and prestigious conferences in EMEA region with its focus on Cyber Security, IT Security, Network Security, Data Security, Cloud Security, Mobile Security, Endpoint Security and Identity and Access Management technologies and solutions. An intensive participation is expected to the ENBANTEC Conference from Turkey and many other countries. ENBANTEC 2024 Conference is an unmissable conference. - Konferenzen und Webinare]]> 2023-12-06T09:06:55+00:00 https://www.globalsecuritymag.fr/04-June-2024-Istanbul-Turkey-ENBANTEC-Cyber-Security-Conference-and-Exhibition.html www.secnews.physaphae.fr/article.php?IdArticle=8419488 False Mobile,Cloud,Conference None 3.0000000000000000 Recorded Future - FLux Recorded Future \\ 'fugitif \\' Aristocrate espagnol derrière la conférence de crypto-monnaie de la Corée du Nord arrêtée<br>\\'Fugitive\\' Spanish aristocrat behind North Korea cryptocurrency conference arrested Alejandro Cao de Ben & Oacute, l'homme espagnol d'une famille aristocratique qui est devenu l'un des partisans les plus vocaux du monde occidental de la Corée du Nord, a été arrêté en Espagne.De Ben & Oacute; S, le fondateur de la Corée d'amitié, a été arrêté la semaine dernière dans une gare de Madrid, selon une annonce par la politique
Alejandro Cao de Benós, the Spanish man from an aristocratic family who became one of the Western world\'s most vocal supporters of North Korea, has been arrested in Spain. De Benós, the founder of the Korean Friendship Association, was arrested last week at a train station in Madrid, according to an announcement by the Policia]]>
2023-12-05T13:05:00+00:00 https://therecord.media/spanish-aristocrat-north-korea-cryptocurrency-arrest www.secnews.physaphae.fr/article.php?IdArticle=8419281 False Conference None 3.0000000000000000
Global Security Mag - Site de news francais 15ème édition des GSDAYS 30 JANVIER 2025 Les événements de Global Security Mag / ]]> 2023-12-04T18:00:26+00:00 https://www.globalsecuritymag.fr/15eme-edition-des-GSDAYS-30-JANVIER-2025.html www.secnews.physaphae.fr/article.php?IdArticle=8419098 False Threat,Conference None 3.0000000000000000 Global Security Mag - Site de news francais Septembre 2024 Calendrier ]]> 2023-12-01T20:13:00+00:00 https://www.globalsecuritymag.fr/Septembre-2024.html www.secnews.physaphae.fr/article.php?IdArticle=8418323 False Conference,Commercial None 3.0000000000000000 Recorded Future - FLux Recorded Future Le président du Conseil de l'UE propose \\ 'Cyber Force européenne \\' avec \\ 'Capacités offensives \\'<br>EU Council president proposes \\'European cyber force\\' with \\'offensive capabilities\\' Charles Michel, président du Conseil européen - l'organisme de l'UE qui établit la direction politique du bloc - a proposé jeudi la création de «une cyber-force européenne… équipée de capacités offensives».«La question sensible de la chaîne de commandement devrait être abordée», a-t-il reconnu lors de la conférence annuelle pour l'Europe
Charles Michel, the president of the European Council - the EU body that sets the bloc\'s political direction - proposed on Thursday the creation of “a European cyber force … equipped with offensive capabilities.” “The sensitive issue of chain of command would need to be addressed,” he acknowledged at the annual conference for the European]]>
2023-12-01T13:14:00+00:00 https://therecord.media/offensive-cyber-force-proposal-european-council-president www.secnews.physaphae.fr/article.php?IdArticle=8418315 False Conference None 3.0000000000000000