Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-10-09 09:55:02 |
Russian Hackers Spy on Military Targets, Governments: Report (lien direct) |
In 2017 and 2018, a Russian cyber-espionage group believed to be government-backed has engaged in covert attacks targeting military and government organizations in Europe and South America, Symantec warns.
|
|
|
|
|
2018-10-09 07:03:05 |
NIST and the Small Business: Addressing Cyber Insecurity (lien direct) |
In August, President Trump signed the NIST Small Business Cybersecurity Act. |
|
|
|
|
2018-10-09 06:51:00 |
Ransomware: Keep Safe and Stay Safe (lien direct) |
Ransomware may not be the threat it once was, but it still poses a risk to the files and systems of businesses everywhere. |
Ransomware
Threat
|
|
|
|
2018-10-05 07:16:04 |
Embracing Cybersecurity Best Practices, No Matter Where You Are (lien direct) |
Much like your physical health, there is no way to guarantee cyber health. |
|
|
|
|
2018-10-02 05:42:00 |
6 Ways to Use CloudTrail to Improve AWS Security (lien direct) |
Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition. |
|
|
|
|
2018-10-02 03:37:00 |
“You\'re Both Right…Now Go To Your Rooms!” (lien direct) |
Traditionally, DevOps and security have butted heads, which causes a stalemate. |
|
|
|
|
2018-10-02 01:37:00 |
DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned (lien direct) |
The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party. |
|
|
|
|
2018-09-26 02:11:04 |
Variations in State Data Breach Disclosure Laws Complicate Compliance (lien direct) |
New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.
|
Data Breach
|
|
|
|
2018-09-25 01:24:01 |
Are Colleges Teaching Real-World Cyber Security Skills? (lien direct) |
The real challenge of the cybersecurity skill shortage is making sure new recruits are prepared for the real world. |
|
|
|
|
2018-09-24 14:48:01 |
What Exactly is Threat Hunting - and Why Does it Matter? (lien direct) |
Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what's truly important. |
Threat
|
|
|
|
2018-09-12 07:18:00 |
It\'s Time to Get Real about Complex, Emerging Threats (lien direct) |
Information security professionals are facing increasingly complex threats-some new, others familiar but evolving. |
|
|
|
|
2018-09-12 06:17:00 |
Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge (lien direct) |
Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt. |
|
|
|
|
2018-09-11 10:52:00 |
Busting the VDI Security Myth (lien direct) |
Virtual Desktop Infrastructure (VDI) is not an isolation solution. If hackers control the end-user's device, they control the VDI resources. |
|
|
|
|
2018-09-11 10:31:04 |
Why Admin Rights Removal Is only the First Step towards Data Protection (lien direct) |
Those that are committed to developing stronger safeguards against cyber threats shouldn't rely on just one method to keep their data safe. |
|
|
|
|
2018-09-11 09:42:05 |
FIN6 Hackers Update Arsenal of Techniques (lien direct) |
A cybercriminal group focused on stealing payment card data records has been using new tactics, techniques and procedures (TTPs) in attacks observed in 2017 and 2018, IBM X-Force security researchers report.
|
|
|
|
|
2018-09-07 15:39:00 |
Hackers and Worms in the Singularity (lien direct) |
On one path to the Singularity, hacking is the worst possible crime. But on the other path, hacking is humanity's highest calling. Either way, the absolute value of hackers is going to be maximal. |
|
|
|
|
2018-09-07 10:52:03 |
Trojanized Extension Uploaded to Google\'s Chrome Store (lien direct) |
A trojanized version of the MEGA extension was uploaded to the Google Chrome webstore and automatically pushed to users via the autoupdate mechanism.
|
|
|
|
|
2018-09-06 07:40:00 |
Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care? (lien direct) |
SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action. |
|
|
|
|
2018-09-04 07:58:00 |
New Payment Tech, New Security Challenges (lien direct) |
New apps and technologies present payment providers with new types of threats. |
|
|
|
|
2018-09-04 05:49:00 |
(Déjà vu) CVE-2018-11776 - The Latest Apache Struts Vulnerability (lien direct) |
A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework. |
Vulnerability
|
|
★★★★
|
|
2018-09-04 03:49:02 |
How Secure Are Popular Finance Apps on Google Play? (lien direct) |
Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities. |
|
|
|
|
2018-08-30 07:47:00 |
The Importance and Requirements of Privileged Access Management (lien direct) |
The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials. |
|
|
|
|
2018-08-30 06:43:00 |
All Data is Security Data: A Shift in Thinking (lien direct) |
Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently. |
|
|
|
|
2018-08-30 05:34:00 |
Conceptual and Technical Challenges in Multi-cloud Security (lien direct) |
Becoming an expert with one cloud platform takes a lot of time and working with multiple clouds at the same time is more difficult and can make teams prone to errors. |
|
|
|
|
2018-08-28 09:13:00 |
How Full Admin Rights Could Pose a Threat to Your Business (lien direct) |
Having unrestricted admin rights in place poses a significant risk of privilege escalation attacks and lateral movement. |
Threat
|
|
|
|
2018-08-28 07:11:00 |
Why the World Needs Disruptive, Effective, Modern Cyber Protection (lien direct) |
Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand. |
|
|
|
|
2018-08-28 07:00:00 |
When a Regulators\' Visit Can Be the Least of Your Worries (lien direct) |
Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance. |
|
|
|
|
2018-08-27 11:43:05 |
"Dark Tequila" Campaign Targets Users in Mexico (lien direct) |
A series of cyberattacks attempting to steal financial information and login credentials from Mexican users, that hve been ongoing for at least five years, Kaspersky Lab says.recently discovered complex malicious campaign has been
|
|
|
|
|
2018-08-06 10:39:00 |
Most SMBs Not Equipped to Handle Security Concerns: Study (lien direct) |
Most small and medium businesses (SMBs) are not equipped to handle IT security concerns and distribute security responsibilities across other roles, a recent Untangle survey reveals.
|
|
|
|
|
2018-08-02 10:40:00 |
Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers (lien direct) |
Pre-execution security technologies coupled with core antimalware technologies can effectively detect and not just block the cryptojacking payload, but also prevent the attack from occurring. |
Threat
|
|
|
|
2018-08-02 08:40:01 |
Changing Security Behaviors Via a Top Down Approach (lien direct) |
When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change. |
Guideline
|
|
|
|
2018-08-01 11:40:00 |
Amnesty International Targeted with NSO Group Spyware (lien direct) |
An Amnesty International staff member was recently targeted with spyware linked to the infrastructure previously associated with Israel surveillance vendor NSO Group.
|
|
|
|
|
2018-07-26 13:27:00 |
Plug Your Cloud Cybersecurity Holes (lien direct) |
Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access. |
Threat
|
|
|
|
2018-07-26 12:26:05 |
Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down? (lien direct) |
Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached. |
|
|
|
|
2018-07-25 11:05:05 |
U.S. Now Leads by Number of DDoS Botnet C&C Servers (lien direct) |
The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.
|
|
|
|
|
2018-07-20 09:34:05 |
Singapore Health Database Hit by \'Major\' Cyberattack (lien direct) |
Singapore's Ministry of Health (MOH) said that a Singapore Health Services (SingHealth) database containing patient data, including personal information on Prime Minister Lee Hsien Loong, was hit by a “major” cyberattack.
|
|
|
|
|
2018-07-16 11:54:00 |
Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws (lien direct) |
The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches. |
|
|
|
|
2018-07-16 11:16:00 |
Memory Protection beyond the Endpoint (lien direct) |
Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots. |
|
|
|
|
2018-07-16 10:50:05 |
Intent Based Networking: Turning Intentions into Reality (lien direct) |
Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security. |
|
|
|
|
2018-07-03 01:58:03 |
Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems (lien direct) |
In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future. |
|
|
|
|
2018-07-03 00:29:00 |
Navigating Dangerous Waters: the Maritime Industry\'s New Cybersecurity Threat as Technology Innovation Grows (lien direct) |
Here is how the maritime industry can overcome cybersecurity challenges to enter the next generation of shipping. |
Threat
|
|
★★★★
|
|
2018-06-28 01:41:02 |
Is User Training the Weakest Link for Your Email Security Approach? (lien direct) |
Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower. |
|
|
|
|
2018-06-27 07:33:00 |
Least Privilege Access – Still at the Front Lines of Security (lien direct) |
The principle of least privilege is a critical component to any effective privileged access management program, but it is not the only principle. |
|
|
|
|
2018-06-27 06:32:00 |
"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening (lien direct) |
In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users. |
|
|
|
|
2018-06-18 01:15:02 |
Every Business Can Have Visibility into Advanced and Sophisticated Attacks (lien direct) |
Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization. |
|
|
|
|
2018-06-13 04:20:00 |
4 Cybersecurity Tips for Staying Safe During the World Cup (lien direct) |
As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup. |
|
|
|
|
2018-06-13 00:19:05 |
Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI\'s Siblings (lien direct) |
To fully understand “machine learning” and “deep learning,” it's worth taking a look at each subfield's advantages and limitations. |
|
|
|
|
2018-06-10 23:42:00 |
Building a Strong, Intentional and Sustainable Security Culture (lien direct) |
By understanding the attributes of organizational culture, leaders can make informed choices when trying to change cultures and improve an organization's overall defense. |
Guideline
|
|
|
|
2018-06-04 05:48:05 |
The 3 Must Knows of Sandboxing (lien direct) |
While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay. |
|
|
|
|
2018-05-31 11:42:03 |
Valve Patches 10-Year Old Flaw in Steam Client (lien direct) |
A remote code execution (RCE) vulnerability that existed in the Steam client for at least 10 years was fully patched only in March this year, according to security firm Context Information Security.
|
|
|
|