What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
globalsecuritymag.webp 2024-07-09 23:30:00 Florent Skrabacz, Groupe Erium : A l\'occasion du Cybermois, entrainez-vous et profitez de ce mois de la cyber pour faire mentir l\'adage en devenant étanche à l\'ingénierie sociale ! (lien direct) Florent Skrabacz, Groupe Erium : A l'occasion du Cybermois, entrainez-vous et profitez de ce mois de la cyber pour faire mentir l'adage en devenant étanche à l'ingénierie sociale ! - Interviews /
globalsecuritymag.webp 2024-07-09 22:30:00 Benoît Fuzeau, CASDEN Banque Populaire, et CLUSIF : NIS 2 est une opportunité pour les RSSI et un moyen de renforcer la Cybersécurité au sein de milliers d\'entreprises et d\'organisations. (lien direct) Benoît Fuzeau, CASDEN Banque Populaire, et CLUSIF : NIS 2 est une opportunité pour les RSSI et un moyen de renforcer la Cybersécurité au sein de milliers d'entreprises et d'organisations. - Interviews /
The_Hackers_News.webp 2024-07-09 18:09:00 La vulnérabilité du protocole de rayon expose les réseaux aux attaques MITM
RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks
(lien direct)
Les chercheurs en cybersécurité ont découvert une vulnérabilité de sécurité dans le protocole d'authentification du réseau RADIUS appelé Blastradius qui pourrait être exploité par un attaquant pour mettre en scène des attaques Mallory dans le milieu (MITM) et des contrôles d'intégrité de contournement dans certaines circonstances. "Le protocole Radius permet à certains messages d'accès à ne pas avoir de vérifications d'intégrité ou d'authentification", Inkbridge
Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be exploited by an attacker to stage Mallory-in-the-middle (MitM) attacks and bypass integrity checks under certain circumstances. "The RADIUS protocol allows certain Access-Request messages to have no integrity or authentication checks," InkBridge
Vulnerability
The_Hackers_News.webp 2024-07-09 17:20:00 Hackers exploitant la console de script Jenkins pour les attaques d'extraction de crypto-monnaies
Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks
(lien direct)
Les chercheurs en cybersécurité ont constaté qu'il est possible pour les attaquants d'armer les instances de console de script Jenkins à une configuration de Jenkins à de nouvelles activités criminelles telles que l'extraction de la crypto-monnaie. "Les erreurs de configuration telles que la configuration mal de la configuration des mécanismes d'authentification exposent le point de terminaison \\ '/ script \' aux attaquants", a déclaré Shubham Singh et Sunil Bharti de Trend Micro \\ dans une rédaction technique
Cybersecurity researchers have found that it\'s possible for attackers to weaponize improperly configured Jenkins Script Console instances to further criminal activities such as cryptocurrency mining. "Misconfigurations such as improperly set up authentication mechanisms expose the \'/script\' endpoint to attackers," Trend Micro\'s Shubham Singh and Sunil Bharti said in a technical write-up
Prediction Technical
DarkReading.webp 2024-07-09 16:37:37 Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi (lien direct) The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities.
The_Hackers_News.webp 2024-07-09 16:30:00 Humint: plonger profondément dans la toile sombre
HUMINT: Diving Deep into the Dark Web
(lien direct)
Clear Web vs Deep Web vs Dark Web Les professionnels du renseignement des menaces divisent Internet en trois composantes principales: Clear Web - Actifs Web qui peuvent être consultés via des moteurs de recherche publics, y compris les médias, les blogs et autres pages et sites. Deep Web - Sites Web et forums non indexés par les moteurs de recherche.Par exemple, la mise en ligne, les services bancaires en ligne, les intranets d'entreprise, les jardins clos, etc.
Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components: Clear Web - Web assets that can be viewed through public search engines, including media, blogs, and other pages and sites. Deep Web - Websites and forums that are unindexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some
Chercheur.webp 2024-07-09 16:27:46 Reverse-Engineering Ticketmaster\'s Barcode System (lien direct) Interesting: By reverse-engineering how Ticketmaster and AXS actually make their electronic tickets, scalpers have essentially figured out how to regenerate specific, genuine tickets that they have legally purchased from scratch onto infrastructure that they control. In doing so, they are removing the anti-scalping restrictions put on the tickets by Ticketmaster and AXS.
RecordedFuture.webp 2024-07-09 16:23:55 Millions cut off from internet due to government throttling, Hurricane Beryl (lien direct) Pas de details / No more details
InfoSecurityMag.webp 2024-07-09 16:15:00 Cyber-Attack on Evolve Bank Exposed Data of 7.6 Million Customers (lien direct) In a statement on Monday, Evolve confirmed the breach includes over 20,000 customers in Maine
DarkReading.webp 2024-07-09 16:06:36 Trojanized jQuery Packages Spread via \'Complex\' Supply Chain Attack (lien direct) The campaign, which distributes dozens of malicious jQuery variants across npm, GitHub, and jsDelivr, appears to be a manual effort, and lacks the typical pattern that characterizes similar, related attacks.
SecurityWeek.webp 2024-07-09 15:42:56 Blastradius Attack expose une faille critique dans le protocole RADIUS âgé de 30 ans
BlastRADIUS Attack Exposes Critical Flaw in 30-Year-Old RADIUS Protocol
(lien direct)
> Le fournisseur de sécurité Inkbridge Networks attire une attention urgente sur la découverte d'un défaut de conception vieux de plusieurs décennies dans le protocole de rayon largement utilisé.
>Security vendor InkBridge Networks calls urgent attention to the discovery of a decades-old design flaw in the widely used RADIUS protocol.
Blog.webp 2024-07-09 15:35:17 Trojanisé JQuery Infiltrates NPM, GitHub et CDNS: des milliers de packages à risque
Trojanized jQuery Infiltrates npm, GitHub, and CDNs: Thousands of Packages at Risk
(lien direct)
Phylum découvre des attaques jQuery à grande échelle à grande échelle ciblant le NPM, le github et les CDN.Les acteurs malveillants volent les données du formulaire utilisateur via & # 8230;
Phylum uncovers large-scale trojanized jQuery attacks targeting npm, GitHub, and CDNs. Malicious actors steal user form data through…
The_Hackers_News.webp 2024-07-09 15:35:00 Les logiciels malveillants de Guardzoo ciblent plus de 450 militaires du Moyen-Orient
GuardZoo Malware Targets Over 450 Middle Eastern Military Personnel
(lien direct)
Le personnel militaire des pays du Moyen-Orient est la cible d'une opération de surveillance continue qui offre un outil de collecte de données Android appelé Guardzoo. La campagne, censée avoir commencé dès octobre 2019, a été attribuée à un acteur de menace aligné par Houthi-Ira basé sur les leurres d'application, les journaux de serveurs de commandement (C2), de ciblage de l'empreinte et de l'attaque
Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android data-gathering tool called GuardZoo. The campaign, believed to have commenced as early as October 2019, has been attributed to a Houthi-aligned threat actor based on the application lures, command-and-control (C2) server logs, targeting footprint, and the attack
Malware Tool Threat Mobile
PaloAlto.webp 2024-07-09 15:30:43 Palo Alto Networks Un leader à nouveau dans le rapport Sase à vendeur unique de Gartner
Palo Alto Networks a Leader Again in Gartner Single-Vendor SASE Report
(lien direct)
> Palo Alto Networks a été reconnu pour la deuxième fois dans le Gartner Magic Quadrant 2024 pour le sase à vendeur unique.Lisez le blog pour en savoir plus.
>Palo Alto Networks has been recognized for the second time in the 2024 Gartner Magic Quadrant for Single-Vendor SASE. Read the blog to learn more.
Commercial
InfoSecurityMag.webp 2024-07-09 15:30:00 Les ransomwares Eldorado frappent les réseaux Windows et Linux
Eldorado Ransomware Strikes Windows and Linux Networks
(lien direct)
Group-IB a également révélé que le ransomware utilise Chacha20 et RSA-OAEP pour le cryptage
Group-IB also revealed the ransomware uses Chacha20 and RSA-OAEP for encryption
Ransomware
globalsecuritymag.webp 2024-07-09 15:21:37 Keeper® et Bechtle unissent leurs forces (lien direct) Keeper Security forme un partenariat avec Bechtle pour étendre sa présence en Europe Keeper® et Bechtle unissent leurs forces, tirant parti du vaste réseau et de l'expertise de Bechtle pour offrir aux clients les solutions novatrices et sécuritaires de Keeper en matière de cybersécurité. - Business
Google.webp 2024-07-09 15:18:01 GCP-2024-026 (lien direct) Published: 2024-05-07Updated: 2024-05-09Description Description Severity Notes 2024-05-09 Update: Corrected severity from Medium to High. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26643 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26643
Google.webp 2024-07-09 15:18:01 GCP-2024-011 (lien direct) Published: 2024-02-15Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-6932 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-6932
Google.webp 2024-07-09 15:18:01 GCP-2024-030 (lien direct) Published: 2024-05-15Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-52620 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-52620
Google.webp 2024-07-09 15:18:01 GCP-2024-012 (lien direct) Published: 2024-02-20Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-0193 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-0193
Google.webp 2024-07-09 15:18:01 GCP-2024-029 (lien direct) Published: 2024-05-14Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26642 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26642
Google.webp 2024-07-09 15:18:01 GCP-2024-024 (lien direct) Published: 2024-04-25Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26585 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26585
Google.webp 2024-07-09 15:18:01 GCP-2024-014 (lien direct) Published: 2024-02-26Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3776 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-3776
Google.webp 2024-07-09 15:18:01 GCP-2024-041 (lien direct) Published: 2024-07-08Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-52654CVE-2023-52656 For instructions and more details, see the following bulletins: GKE security bulletin GDC software for VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GDC software for bare metal security bulletin High CVE-2023-52654 CVE-2023-52656
Google.webp 2024-07-09 15:18:01 GCP-2024-013 (lien direct) Published: 2024-02-27Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3610 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-3610
Google.webp 2024-07-09 15:18:01 GCP-2024-010 (lien direct) Published: 2024-02-14Updated: 2024-04-17Description Description Severity Notes 2024-04-17 Update: Added patch versions for GKE on VMware. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes.CVE-2023-6931 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-6931
Google.webp 2024-07-09 15:18:01 GCP-2024-038 (lien direct) Published: 2024-06-26Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26924 For instructions and more details, see the following bulletins: GKE security bulletin GDC software for VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GDC software for bare metal security bulletin High CVE-2024-26924
Google.webp 2024-07-09 15:18:01 GCP-2024-034 (lien direct) Published: 2024-06-11Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2024-26583 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26583
Google.webp 2024-07-09 15:18:01 GCP-2024-039 (lien direct) Published: 2024-06-28Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26923 For instructions and more details, see the following bulletins: GKE security bulletin GDC software for VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GDC software for bare metal security bulletin High CVE-2024-26923
Google.webp 2024-07-09 15:18:01 GCP-2024-027 (lien direct) Published: 2024-05-08Updated: 2024-05-09, 2024-05-15Description Description Severity Notes 2024-05-15 Update: Added patch versions for GKE Ubuntu node pools. 2024-05-09 Update: Corrected severity from Medium to High and clarified that GKE Autopilot clusters in the default configuration are not impacted. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26808 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26808
Google.webp 2024-07-09 15:18:01 GCP-2024-017 (lien direct) Published: 2024-03-06Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2023-3611 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2023-3611
Google.webp 2024-07-09 15:18:01 GCP-2024-035 (lien direct) Published: 2024-06-12Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26584 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26584
Google.webp 2024-07-09 15:18:01 GCP-2024-036 (lien direct) Published: 2024-06-18Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2024-26584 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26584
Google.webp 2024-07-09 15:18:01 GCP-2024-018 (lien direct) Published: 2024-03-12Updated: 2024-04-04, 2024-05-06Description Description Severity Notes 2024-05-06 Update: Added patch versions for GKE Ubuntu node pools. 2024-04-04 Update: Corrected minimum versions for GKE Container-Optimized OS node pools. The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-1085 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-1085
Google.webp 2024-07-09 15:18:01 GCP-2024-033 (lien direct) Published: 2024-06-10Description Description Severity Notes The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS nodes:CVE-2022-23222 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2022-23222
Google.webp 2024-07-09 15:18:01 GCP-2024-028 (lien direct) Published: 2024-05-13Updated: 2024-05-22Description Description Severity Notes 2024-05-22 Update: Added patch versions for Ubuntu The following vulnerabilities were discovered in the Linux kernel that can lead to a privilege escalation on Container-Optimized OS and Ubuntu nodes:CVE-2024-26581 For instructions and more details, see the following bulletins: GKE security bulletin GKE on VMware security bulletin GKE on AWS security bulletin GKE on Azure security bulletin GKE on Bare Metal security bulletin High CVE-2024-26581
silicon.fr.webp 2024-07-09 15:11:36 Les modèles Llama expérimentés pour la gestion d\'incidents (lien direct) Meta a expérimenté l'ajustement d'un modèle Llama 2 pour la détection des causes racines.
SonarSource.webp 2024-07-09 15:00:00 Sécuriser les outils du développeur: vulnérabilités de code non corrigées dans GOGS (2/2)
Securing Developer Tools: Unpatched Code Vulnerabilities in Gogs (2/2)
(lien direct)
Découvrez les vulnérabilités de code critiques que nous avons découvertes dans GOGS, une solution d'hébergement de code source.Ce suivi couvre la façon dont les défauts moins graves peuvent encore avoir un impact critique.
Learn about critical code vulnerabilities we discovered in Gogs, a source code hosting solution. This follow-up covers how less severe flaws can still have a critical impact.
Tool Vulnerability
SecurityWeek.webp 2024-07-09 14:58:50 Command Zero émerge du mode furtif pour accélérer les cyber-investigations
Command Zero Emerges From Stealth Mode to Speed Up Cyber Investigations
(lien direct)
> Command Zero est émergé du mode furtif avec 21 millions de dollars dans une ronde de financement des semences dirigée par Andreessen Horowitz.
>Command Zero has emerged from stealth mode with $21 million in a seed funding round led by Andreessen Horowitz.
globalsecuritymag.webp 2024-07-09 14:51:41 Présentation du contrôle de la mission Attackiq
Introducing AttackIQ Mission Control
(lien direct)
Présentation du contrôle de la mission AttackIQ Rationaliser les opérations de sécurité pour une correction et un retour sur investissement plus rapides. - revues de produits
Introducing AttackIQ Mission Control Streamline Security Operations for Faster Remediation and ROI. - Product Reviews
globalsecuritymag.webp 2024-07-09 14:09:45 Optiv a lancé Optiv MDR
Optiv has launched Optiv MDR
(lien direct)
Optiv MDR permet aux organisations de rester de manière proactive en avance sur les cyber-menaces émergentes Le service géré aborde les clients \\ 'Besoin urgent d'externaliser la détection et la réponse des menaces. Optiv a lancé son service de détection et de réponse géré, Optiv Mdr - revues de produits
Optiv MDR Enables Organizations to Proactively Stay Ahead of Emerging Cyber Threats Managed Service Addresses Clients\' Urgent Need to Outsource Threat Detection and Response. Optiv has launched its managed detection and response service, Optiv MDR - Product Reviews
Threat
DarkReading.webp 2024-07-09 14:00:00 Le retrait de CISA d'Ivanti Systems est un réveil
CISA Takedown of Ivanti Systems Is a Wake-up Call
(lien direct)
L'exploitation des vulnérabilités du logiciel d'Ivanti \\ souligne la nécessité de mesures de cybersécurité robustes et de stratégies de réponse proactive pour atténuer les risques et protéger les actifs critiques.
The exploitation of vulnerabilities in Ivanti\'s software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate risks and protect critical assets.
Vulnerability
globalsecuritymag.webp 2024-07-09 13:49:10 À mesure que l'IA avance, les cyber-menaces augmentent.Les entreprises sont-elles prêtes à gérer la situation?
As AI advances, cyber threats increase. Are businesses prepared to handle the situation?
(lien direct)
À mesure que l'IA avance, les cyber-menaces augmentent.Les entreprises sont-elles prêtes à gérer la situation?Kyocera avertit que les outils d'IA pourraient donner aux attaquants un avantage injuste dans le développement et la réalisation de campagnes de ransomwares - rapports spéciaux
As AI advances, cyber threats increase. Are businesses prepared to handle the situation? Kyocera warns that AI tools could give attackers an unfair advantage in developing and carrying out ransomware campaigns - Special Reports
Ransomware Tool
globalsecuritymag.webp 2024-07-09 13:47:06 51 % des cyberattaques visant le secteur des fournisseurs de services gérés (MSP) entraînent des dépenses imprévues pour combler les lacunes de cybersécurité (lien direct) 51 % des cyberattaques visant le secteur des fournisseurs de services gérés (MSP) entraînent des dépenses imprévues pour combler les lacunes de cybersécurité 31 % des MSP ayant subi une cyberattaque déclarent avoir perdu de leur compétitivité, contre 20 % dans les autres secteurs interrogés. - Investigations
globalsecuritymag.webp 2024-07-09 13:45:27 Soteria Lab lève plus de 800 k€ auprès de Yeast, Groupe ILP et Bpifrance (lien direct) Soteria Lab lève plus de 800 k€ auprès de Yeast, Groupe ILP et Bpifrance Objectif : Premier Pure Player de la Cybersécurité dédié aux TPE et PME en région Grand Est - Business
globalsecuritymag.webp 2024-07-09 13:43:11 51% des cyberattaques du secteur des prestataires de services gérés (MSP) conduisent à des dépenses imprévues pour réparer les lacunes de sécurité
51% of cyberattacks in the managed service provider (MSP) sector lead to unplanned expenses to fix security gaps
(lien direct)
51% des cyberattaques du secteur du fournisseur de services gérées (MSP) ont conduit à des dépenses imprévues pour réparer les lacunes de sécurité.Netwrix, un fournisseur qui fournit une cybersécurité efficace et accessible à toute organisation, a publié des résultats supplémentaires pour le secteur des prestataires de services gérés (MSP) de son rapport annuel sur les tendances de sécurité hybride en 2024 basée sur une enquête mondiale auprès de 1 309 professionnels de l'informatique et de la sécurité. 31% des MSP qui ont repéré un rapport d'attaque perdant un avantage concurrentiel contre 20% dans les autres industries interrogées - rapports spéciaux
51% of cyberattacks in the managed service provider (MSP) sector lead to unplanned expenses to fix security gaps. Netwrix, a vendor that delivers effective and accessible cybersecurity to any organisation, released additional findings for the managed service providers (MSP) sector from its annual 2024 Hybrid Security Trends Report based on a global survey of 1,309 IT and security professionals. 31% of the MSPs that spotted an attack report losing a competitive edge compared to 20% across other industries surveyed - Special Reports
ZoneAlarm.webp 2024-07-09 13:41:10 La plus grande violation de cybersécurité exposant 10 milliards de mots de passe
The Largest Cybersecurity Breach Exposing 10 Billion Passwords
(lien direct)
> La fuite de mot de passe Rockyou2024 est devenue la plus grande violation de données connue de l'histoire, exposant environ 10 milliards de mots de passe.Nommé d'après la tristement célèbre violation de Rockyou de 2009, ce dernier incident dépasse considérablement son prédécesseur.En juillet 2024, un pirate utilisant l'alias & # 8220; Obamacare & # 8221;Téléchargé le fichier rockyou2024.txt sur un forum de criminalité populaire.Le fichier rockyou2024.txt & # 8230;
>The RockYou2024 password leak has emerged as the largest known data breach in history, exposing approximately 10 billion passwords. Named after the infamous RockYou breach of 2009, this latest incident significantly surpasses its predecessor. In July 2024, a hacker using the alias “ObamaCare” uploaded the RockYou2024.txt file to a popular crime forum. The RockYou2024.txt file …
Data Breach
silicon.fr.webp 2024-07-09 13:40:52 Quantique : Pasqal et CMA CGM se rapprochent (lien direct) Le troisième armateur mondial, CMA CGM, s'associe avec Pasqal pour développer ses compétences dans la quantique et prend une participation à son capital.
globalsecuritymag.webp 2024-07-09 13:33:45 Le CNApp de Sentinelone \\ s'accumule sur 240 G2 Awards
SentinelOne\\'s CNAPP racks up over 240 G2 Awards
(lien direct)
Sentinelone \'s CNApp accumule plus de 240 G2 Awards Les utilisateurs réels évaluent la sécurité du cloud de la singularité dans le meilleur de l'industrie dans la protection des applications natives cloud, la gestion de la posture de sécurité du cloud et la protection de la charge de travail cloud en 2024 rapports de grille d'été - nouvelles commerciales
SentinelOne\'s CNAPP racks up over 240 G2 Awards Real users rate Singularity Cloud Security as best in industry across cloud native application protection, cloud security posture management and cloud workload protection in 2024 Summer Grid Reports - Business News
Cloud
RecordedFuture.webp 2024-07-09 13:29:33 La plate-forme GOP affirme que la protection des infrastructures critiques contre les pirates est une priorité nationale \\ '.
GOP platform says protecting critical infrastructure from hackers is a \\'national priority\\'
(lien direct)
Pas de details / No more details
Last update at: 2024-07-09 17:07:42
See our sources.
My email:

To see everything: RSS Twitter