Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-07-08 14:00:00 |
Zero Trust Bolsters Our National Defense Against Rising Cyber Threats (lien direct) |
The Colonial Pipeline and JBS attacks, among others, showed us our national resilience is only as strong as public-private sector collaboration. |
Threat
|
|
|
|
2022-07-07 14:04:26 |
Empower Your Security Operations Team to Combat Emerging Threats (lien direct) |
When examining the modern threat landscape, empowering your security operations and overcoming the limitations inherent with other malware prevention solutions is imperative. |
Malware
Threat
|
|
|
|
2022-07-05 17:00:00 |
Why Browser Vulnerabilities Are a Serious Threat - and How to Minimize Your Risk (lien direct) |
As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines. |
Threat
|
|
|
|
2022-07-05 14:00:00 |
3 Cyber Threats Resulting From Today\'s Technology Choices to Hit Businesses by 2024 (lien direct) |
Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code tools. |
Threat
|
|
|
|
2022-06-30 20:21:23 |
Google: Hack-for-Hire Groups Present a Potent Threat (lien direct) |
Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of new reports said. |
Threat
|
|
|
|
2022-06-30 18:29:00 |
Exchange Servers Backdoored Globally by SessionManager (lien direct) |
Malicious ISS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say. |
Threat
|
|
|
|
2022-06-29 12:30:44 |
5 Surprising Cyberattacks AI Stopped This Year (lien direct) |
See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional defensive measures - but were busted by AI. |
Threat
|
|
|
|
2022-06-21 14:30:40 |
BRATA Android Malware Evolves Into an APT (lien direct) |
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities. |
Malware
Threat
|
|
|
|
2022-06-10 19:21:39 |
Symbiote Malware Poses Stealthy, Linux-Based Threat to Financial Industry (lien direct) |
A Linux-based banking Trojan is a master at staying under the radar. |
Malware
Threat
|
|
|
|
2022-06-01 21:30:59 |
Hunting for Threats Using Network Traffic Flows (lien direct) |
SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems. |
Threat
|
|
|
|
2022-06-01 21:08:04 |
FluBot Android Malware Operation Disrupted, Infrastructure Seized (lien direct) |
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years. |
Malware
Threat
|
|
|
|
2022-06-01 20:49:18 |
NetSPI\'s New Breach and Attack Simulation Enhancements Help Organizations Achieve Behavior-Based Threat Detection (lien direct) |
Organizations leverage the platform-driven, human-delivered service to measure and continuously improve the efficacy of detective controls and MSSP coverage. |
Threat
|
|
|
|
2022-06-01 16:33:21 |
Ordr Secures $40 Million in Series C Funding to Answer Increased Demand for Connected Device Security (lien direct) |
Rising threat of data breaches and ransomware attacks drives need for complete and accurate real-time information about devices and their risks. |
Ransomware
Threat
|
|
|
|
2022-05-25 22:11:47 |
Most Common Threats in DBIR (lien direct) |
Supply chain and ransomware attacks increased dramatically this year, which explains why so many data breaches in this year's DBIR were grouped as system intrusion. |
Ransomware
Threat
|
|
|
|
2022-05-25 19:25:51 |
Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report (lien direct) |
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021. |
Threat
|
|
|
|
2022-05-24 21:13:51 |
New Attack Shows Weaponized PDF Files Remain a Threat (lien direct) |
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows. |
Threat
|
|
|
|
2022-05-19 14:00:00 |
6 Scary Tactics Used in Mobile App Attacks (lien direct) |
Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene. |
Malware
Threat
|
|
|
|
2022-05-09 22:19:47 |
Joker, Other Fleeceware Surges Back Into Google Play (lien direct) |
The infamous Joker threat is back in Google Play, along with other Trojanized mobile apps that secretly sign Android users up for paid subscription services. |
Threat
|
|
|
|
2022-05-05 21:21:52 |
Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials (lien direct) |
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says. |
Threat
|
|
|
|
2020-11-17 10:35:00 |
An Inside Look at an Account Takeover (lien direct) |
AI threat find: Phishing attack slips through email gateway and leads to large-scale compromise. |
Threat
Guideline
|
|
|
|
2020-11-12 18:00:00 |
Manufacturing Sees Rising Ransomware Threat (lien direct) |
Crypto-ransomware groups are increasingly adopting malware and tools that can probe and attack operational technology, such as industrial control systems, according to an assessment of current threats. |
Ransomware
Malware
Threat
|
|
|
|
2020-10-07 17:30:00 |
New \'HEH\' Botnet Targets Exposed Telnet Services (lien direct) |
Latest threat is one in a growing list of malware developed in the Go programming language. |
Malware
Threat
|
|
|
|
2020-10-01 10:00:00 |
Cryptojacking: The Unseen Threat (lien direct) |
Mining malware ebbs and flows with the price of cryptocurrencies, and given the momentum on price is upward, cryptojacking is a very present threat. |
Malware
Threat
|
|
|
|
2020-09-30 14:00:00 |
COVID-19 Creates Opening for OT Security Reform (lien direct) |
Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape. |
Threat
|
|
|
|
2020-08-28 13:05:00 |
TA542 Returns With Emotet: What\'s Different Now (lien direct) |
Researchers report the TA542 threat group has made code changes to its malware and started targeting new locations with Emotet. |
Malware
Threat
|
|
|
|
2020-08-20 14:00:00 |
Twitter Hack: The Spotlight that Insider Threats Need (lien direct) |
The high profile attack should spur serious board-level conversations around the importance of insider threat prevention. |
Threat
|
|
|
|
2020-08-03 16:45:00 |
DHS Urges \'Highest Priority\' Attention on Old Chinese Malware Threat (lien direct) |
"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008. |
Malware
Tool
Threat
|
|
|
|
2020-06-25 09:00:00 |
\'GoldenSpy\' Malware Hidden in Tax Software Spies on Companies Doing Business in China (lien direct) |
Advanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China. |
Malware
Threat
|
|
|
|
2020-06-11 17:30:00 |
ICS Threat Snake Ransomware Suspected in Honda Attack (lien direct) |
An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world. |
Ransomware
Threat
|
|
|
|
2020-05-26 17:25:00 |
StrandHogg 2.0 Emerges as \'Evil Twin\' to Android Threat (lien direct) |
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor. |
Threat
|
|
|
|
2020-04-08 10:00:00 |
Why Threat Hunting with XDR Matters (lien direct) |
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
|
Threat
|
|
|
|
2020-03-24 10:55:00 |
Automated Tools Make Cyberattacks Easier to Pull Off (lien direct) |
Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says. |
Threat
|
|
|
|
2020-03-12 18:20:00 |
Russia-Based Turla APT Group\'s Infrastructure, Activity Traceable (lien direct) |
Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future. |
Malware
Threat
|
|
|
|
2020-01-16 17:30:00 |
New Attack Campaigns Suggest Emotet Threat Is Far From Over (lien direct) |
Malware described by the DHS as among the worst ever continues to evolve and grow, researchers from Cisco Talos, Cofense, and Check Point Software say. |
Malware
Threat
|
|
|
|
2020-01-09 10:30:00 |
Operationalizing Threat Intelligence at Scale in the SOC (lien direct) |
Open source platforms such as the Malware Information Sharing Platform are well positioned to drive a community-based approach to intelligence sharing. |
Malware
Threat
|
|
|
|
2019-11-27 12:00:00 |
Google Details Its Responses to Cyber Attacks, Disinformation (lien direct) |
Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group. |
Threat
|
|
|
|
2019-11-19 18:40:00 |
Ransomware Surge & Living-Off-the-Land Tactics Remain Big Threats (lien direct) |
Group-IB's and Rapid7's separate analysis of attack activity in recent months shows threat actors are making life harder for enterprise organizations in a variety of ways. |
Ransomware
Threat
|
|
|
|
2019-10-31 16:20:00 |
Chinese Cyber Espionage Group Steals SMS Messages via Telco Networks (lien direct) |
APT41's new campaign is latest to highlight trend by Chinese threat groups to attack upstream service providers as a way to reach its intended targets, FireEye says. |
Threat
Guideline
|
APT 41
|
|
|
2019-09-25 11:15:00 |
Web Attacks Focus on SQL Injection, Malware on Credentials (lien direct) |
Attackers continue to focus on bread-and-butter tactics, according to a quarterly threat report. |
Malware
Threat
|
|
|
|
2019-07-25 17:25:00 |
Russian Threat Group May Have Devised a \'Man-on-the-Side\' Attack (lien direct) |
Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says. |
Threat
|
|
|
|
2019-07-18 17:30:00 |
BitPaymer Ransomware Operators Wage Custom, Targeted Attacks (lien direct) |
A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says. |
Ransomware
Malware
Threat
|
|
★★
|
|
2019-07-11 17:45:00 |
APT Groups Make Quadruple What They Spend on Attack Tools (lien direct) |
Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge. |
Threat
|
|
|
|
2019-07-03 15:45:00 |
New \'WannaHydra\' Malware a Triple Threat to Android (lien direct) |
The latest variant of WannaLocker is a banking Trojan, spyware tool, and ransomware. |
Malware
Threat
|
|
|
|
2019-06-20 18:00:00 |
Attackers Exploit MSP\'s Tools to Distribute Ransomware (lien direct) |
Early information suggests threat actors gained access to the managed service provider's remote monitoring and management tools and used them to attack the firm's clients. |
Ransomware
Threat
|
|
|
|
2019-04-04 19:25:00 |
Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware (lien direct) |
The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals. |
Malware
Threat
|
|
|
|
2019-03-06 16:30:00 |
New Threat Group Using Old Technique to Run Custom Malware (lien direct) |
Whitefly is exploiting DLL hijacking with considerable success against organizations since at least 2017, Symantec says. |
Malware
Threat
|
|
|
|
2019-03-05 14:15:00 |
Lazarus Research Highlights Threat from North Korea (lien direct) |
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen. |
Threat
Medical
|
APT 38
|
|
|
2019-02-27 16:45:00 |
Persistent Attackers Rarely Use Bespoke Malware (lien direct) |
Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools. |
Malware
Threat
|
APT 27
|
|
|
2019-02-22 15:10:00 |
New Malware Campaign Targets Job Seekers (lien direct) |
LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages. |
Malware
Threat
|
|
|
|
2019-01-24 14:00:00 |
New Phishing Campaign Packs Triple Threat (lien direct) |
Attack threatens victims with three "deadly malware" infestations if they don't give up critical email account credentials. |
Threat
|
|
|