Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2017-07-31 17:45:00 |
Ransomware Attack on Merck Caused Widespread Disruption to Operations (lien direct) |
Pharmaceutical giant's global manufacturing, research and sales operations have still not be full restored since the June attacks. |
|
|
|
|
2017-07-31 15:40:00 |
Anthem Hit with Data Breach of 18,580 Medicare Members (lien direct) |
Third-party service provider for the insurer discovered one of its employees allegedly engaged in identity theft of thousands of Anthem Medicare members. |
|
|
|
|
2017-07-31 12:35:00 |
Healthcare Execs Report Rise in Data Breaches and HIPAA Violations (lien direct) |
IT executives, however, increasingly believe they are "completely ready" to withstand a cybersecurity attack on their healthcare system. |
|
|
|
|
2017-07-28 17:30:00 |
(Déjà vu) Wannacry Inpires Worm-like Module in Trickbot (lien direct) |
The malware is being primarily distributed via email spam in the form of spoofed invoices from an international financial services com, says Flashpoint. |
|
Wannacry
|
|
|
2017-07-28 17:30:00 |
(Déjà vu) Wannacry Inspires Worm-like Module in Trickbot (lien direct) |
The malware is being primarily distributed via email spam in the form of spoofed invoices from an international financial services com, says Flashpoint. |
|
Wannacry
|
|
|
2017-07-28 17:00:00 |
Lethal Dosage of Cybercrime: Hacking the IV Pump (lien direct) |
At DEF CON, a researcher demonstrated how to attack a popular model of infusion pump used in major hospitals around the world. |
|
|
|
|
2017-07-27 21:58:00 |
Researchers Release Free Tool to Analyze ICS Malware (lien direct) |
CrashOverride/Industroyer malware used against Ukraine's power grid the inspiration for the reverse-engineering tool. |
|
|
|
|
2017-07-27 20:10:00 |
Broadcom Chipset Bug in Android, iOS Smartphones Allows Remote Attack (lien direct) |
Security researcher found a common flaw in Android and iOS smartphone chipsets that could allow a remote exploit to be unleashed on millions of devices. |
|
|
|
|
2017-07-27 08:00:00 |
Downtime from Ransomware More Lethal to Small Businesses Than the Ransom (lien direct) |
New survey of small-to midsized businesses (SMBs) shows half of SMBs infected with malware suffer 25 hours or more of business disruption. |
|
|
|
|
2017-07-25 09:00:00 |
Lessons from Verizon: Managing Cloud Security for Partners (lien direct) |
The recent Verizon breach - data exposed by an insecure Amazon S3 bucket - highlights the need for enterprises to have visibility into how partners and other stakeholders keep their data secure. |
|
|
|
|
2017-07-25 07:30:00 |
Regulators Question Wells Fargo Regarding Data Breach (lien direct) |
Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers. |
|
|
|
|
2017-07-20 15:45:00 |
US Banks Targeted with Trickbot Trojan (lien direct) |
Necurs botnet spreads Trickbot malware to US financial institutions, while new Emotet banking Trojan attacks discovered - signalling increasingly complex attacks on the industry. |
|
|
|
|
2017-07-20 15:30:00 |
Major Online Criminal Marketplaces AlphaBay and Hansa Shut Down (lien direct) |
International law enforcement operations result in AlphaBay, the largest online marketplace for selling illegal goods from malware to herion, and Hansa, going dark. |
|
|
|
|
2017-07-19 20:00:00 |
\'AVPass\' Sneaks Malware Past Android Antivirus Apps (lien direct) |
Researchers at Black Hat USA will release a toolset that studies and then cheats specific Android AV apps. |
|
|
|
|
2017-07-19 11:33:00 |
Catastrophic Cloud Attack Costs Would Rival that of Hurricane Damages (lien direct) |
Lloyd's of London estimates multi-billion-dollar loss figures in worst-case scenarios of a major zero-day exploit or massive cloud outage. |
|
|
|
|
2017-07-18 15:26:00 |
Dow Jones Data Leak Results from Amazon AWS Configuration Error (lien direct) |
Security pros expect to see more incidents like the Dow Jones leak, which exposed customers' personal information following a public cloud configuration error. |
|
|
|
|
2017-07-18 14:19:00 |
Apple iOS Malware Growth Outpaces that of Android (lien direct) |
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows. |
|
|
|
|
2017-07-17 16:00:00 |
Researchers Create Framework to Evaluate Endpoint Security Products (lien direct) |
Black Hat USA researchers tested more than 30,000 types of malware to learn the effectiveness of endpoint security tools - and they'll demonstrate how they did it. |
|
|
|
|
2017-07-14 12:12:00 |
AsTech Offers a $5 Million Security Breach Warranty (lien direct) |
AsTech expands its warranty program with a guarantee it will find Internet application vulnerabilities or it will pay up to $5 million if there is a breach. |
|
|
|
|
2017-07-13 16:46:00 |
Study: Backdoors Found on 73% of Compromised Websites (lien direct) |
No such thing as 'too small to hack,' according to research from SMB security provider SiteLock. |
|
|
|
|
2017-07-12 17:50:00 |
Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers (lien direct) |
Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers. |
|
|
|
|
2017-07-12 17:20:00 |
How Active Intrusion Detection Can Seek and Block Attacks (lien direct) |
Researchers at Black Hat USA will demonstrate how active intrusion detection strategies can help administrators detect hackers who are overly reliant on popular attack tools and techniques. |
|
|
|
|
2017-07-07 12:50:00 |
NotPetya: How to Prep and Respond if You\'re Hit (lien direct) |
Security pros share practices to prepare and handle advanced malware attacks like NotPetya. |
|
NotPetya
|
|
|
2017-07-07 12:50:00 |
IoT Physical Attack Exploit to be Revealed at Black Hat (lien direct) |
Security researcher Billy Rios plans to demonstrate how an exploit can cause an IoT device to launch a physical attack against a human. |
|
|
|
|
2017-07-06 14:30:00 |
Sabre Breach Investigation Concludes with Impact Limited (lien direct) |
The travel company finds that attackers gained limited access to a subset of its bookings in its reservation system. |
|
|
|
|
2017-07-06 14:30:00 |
CopyCat Malware Infects 14 Million Android Devices (lien direct) |
A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware. |
|
|
|
|
2017-07-06 00:00:00 |
The Impact of a Security Breach 2017 (lien direct) |
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. |
|
|
|
|
2017-07-05 20:25:00 |
Bitcoin Funds Stolen from Bithumb Exchange (lien direct) |
Exchange employee's home PC the initial attack vector. |
|
Bithumb
|
|
|
2017-06-30 13:10:00 |
8tracks Hit With Breach of 18 Million Accounts (lien direct) |
Hackers attack Internet radio user database, gaining access to email addresses and encrypted passwords. |
|
|
|
|
2017-06-29 19:23:00 |
Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye (lien direct) |
Experts discuss the methods and targets involved in this week's massive malware outbreak to figure out what motivated attackers. |
|
NotPetya
|
|
|
2017-06-29 10:00:00 |
Why Enterprise Security Needs a New Focus (lien direct) |
The WannaCry ransomware attack shows patching and perimeter defenses aren't enough. Enterprises should combine preventative measures with threat detection tactics. |
|
Wannacry
|
|
|
2017-06-28 13:40:00 |
After Cyber Attack, FedEx Temporarily Halts Trading of Its Shares (lien direct) |
An attack at subsidiary TNT Express may disrupt FedEx's push to hit a record-high share price. |
|
FedEx
|
|
|
2017-06-28 12:15:00 |
Researchers Find \'Vaccine\' for Global Ransomware Attack (lien direct) |
A vaccine, not a killswitch, has been discovered to prevent the Petya/NotPetya ransomware from infecting machines. |
|
NotPetya
|
|
|
2017-06-27 16:49:00 |
Petya Or Not? Global Ransomware Outbreak Hits Europe\'s Industrial Sector, Thousands More (lien direct) |
With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample. |
|
Wannacry
|
|
|
2017-06-26 17:16:00 |
Anthem Agrees to $115 Million Settlement for 2015 Breach (lien direct) |
If approved, it will dwarf settlements paid by Target, Home Depot, and Ashley Madison. |
|
|
|
|
2017-06-23 14:08:00 |
Android Marcher Variant Makes Rounds as Adobe Flash Player Update (lien direct) |
Zscaler researchers discover a new variant of the Android Marcher malware, which aims to steal online banking credentials and credit card information. |
|
|
|
|
2017-06-23 12:00:00 |
$12B in Fraud Loss Came from Data Breach Victims in 2016 (lien direct) |
Three-quarters of the total fraud losses for 2016 arose from victims who had been victims of a data breach within the previous six years. |
|
|
|
|
2017-06-23 11:08:00 |
RAT Vulnerabilities Turn Hackers into Victims (lien direct) |
A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors. |
|
|
|
|
2017-06-22 14:35:00 |
Cloud Security Lessons from the RNC Leak (lien direct) |
A poorly configured Amazon S3 bucket that led to a massive data leak could easily happen to any organization not adopting proper cloud security measures. |
|
|
|
|
2017-06-22 10:00:00 |
WannaCry? You\'re Not Alone: The 5 Stages of Security Grief (lien direct) |
As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance. |
|
Wannacry
|
|
|
2017-06-21 19:15:00 |
\'Stack Clash\' Smashed Security Fix in Linux (lien direct) |
Linux, OpenBSD, Free BSD, Solaris security updates available to thwart newly discovered attack by researchers. |
|
|
|
|
2017-06-20 14:25:00 |
Data Breach Costs Drop Globally But Increase in US (lien direct) |
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%. |
|
|
|
|
2017-06-20 14:10:00 |
Apple iOS Threats Fewer Than Android But More Deadly (lien direct) |
Data leakage and corruption haunt iOS and Android mobile apps the most, a new study shows. |
|
|
|
|
2017-06-19 17:30:00 |
RNC Voter Data on 198 Million Americans Exposed in the Cloud (lien direct) |
One of the largest known US voter data leaks compromised personal information via an unsecured public-storage cloud account set up on behalf of the Republican National Committee. |
|
|
|
|
2017-06-16 14:55:00 |
FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries (lien direct) |
Previously unknown threat actor has extracted hundreds of thousands of dollars from Canadian companies in a vicious cyberattack campaign that dates back to 2013, FireEye says. |
|
|
|
|
2017-06-16 10:00:00 |
Android Security Apps for BYOD Users (lien direct) |
A look at 8 security apps that experts recommend for Android.
|
|
|
|
|
2017-06-15 09:05:00 |
Malware Incidents at US SMBs Spiked 165% in Q1 (lien direct) |
Texas-based SMBs suffered the most malware attack attempts in the first quarter while those in Arizona had the biggest year-over-year increase, according to new Malwarebytes report. |
|
|
|
|
2017-06-14 10:00:00 |
Relentless Attackers Try Over 100,000 Times Before They Breach a System (lien direct) |
|
|
|
|
|
2017-06-12 18:36:00 |
First Malware Designed Solely for Electric Grids Caused 2016 Ukraine Outage (lien direct) |
Attackers used CrashOverride/Industroyer to cause a partial power outage in Kiev, Ukraine, but it can be used anywhere, say researchers at Dragos and ESET. |
|
|
|
|
2017-06-09 15:05:00 |
New Attack Method Delivers Malware Via Mouse Hover (lien direct) |
'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan. |
|
|
|