Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-10 21:21:26 |
Cisco Talos: TTPS Ransomware TOP exposé Cisco Talos: Top Ransomware TTPs Exposed (lien direct) |
Découvrez le nouveau rapport Cisco Talos sur les techniques des groupes de ransomware supérieurs et apprenez à atténuer ce risque de cybersécurité.Cisco Talos a observé les TTP utilisés par 14 des groupes de ransomwares les plus répandus en fonction de leur volume d'attaque, de l'impact sur les clients et du comportement atypique.
Read about the new Cisco Talos report on the top ransomware groups\' techniques and learn how to mitigate this cybersecurity risk. Cisco Talos observed the TTPs used by 14 of the most prevalent ransomware groups based on their volume of attack, impact to customers and atypical behavior. |
Ransomware
Studies
|
|
★★★★
|
|
2024-05-03 16:52:14 |
Top 5 des tendances mondiales de la cybersécurité de 2023, selon Google Report Top 5 Global Cyber Security Trends of 2023, According to Google Report (lien direct) |
Selon le rapport M-Trends, le temps moyen nécessaire à une organisation pour détecter un attaquant dans son environnement a diminué de 16 jours en 2022 à 10 jours en 2023.
According to the M-Trends report, the average time it takes for an organisation to detect an attacker in their environment has decreased from 16 days in 2022 to 10 days in 2023. |
Studies
|
|
★★★
|
|
2024-04-18 16:26:44 |
Étude de Kaspersky: les appareils infectés par des logiciels malveillants de vol de données ont augmenté de 7 fois depuis 2020 Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020 (lien direct) |
Près de 10 millions de dispositifs ont été infectés par des logiciels malveillants de vol de données en 2023, les criminels volant en moyenne 50,9 informations d'identification par appareil.
Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device. |
Malware
Studies
|
|
★★★
|
|
2024-04-12 15:44:26 |
Étude Sophos: 94% des victimes de ransomwares ont leurs sauvegardes ciblées par les attaquants Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers (lien direct) |
La recherche a révélé que les criminels peuvent exiger une rançon plus élevée lorsqu'ils compromettent les données de sauvegarde d'une organisation dans une attaque de ransomware.Découvrez les conseils d'experts en sécurité sur la façon de protéger correctement votre sauvegarde.
Research has found that criminals can demand higher ransom when they compromise an organisation\'s backup data in a ransomware attack. Discover advice from security experts on how to properly protect your backup. |
Ransomware
Studies
|
|
★★★
|
|
2024-01-24 20:38:38 |
Étude du National Cyber Security Center: L'IA générative peut augmenter la menace mondiale des ransomwares National Cyber Security Centre Study: Generative AI May Increase Global Ransomware Threat (lien direct) |
Voir les prédictions de NCSC \\ pour l'IA générative pour la cyberattaque et la défense jusqu'en 2025.
See NCSC\'s predictions for generative AI for cyber attack and defense through 2025. |
Threat
Ransomware
Studies
|
|
★★★
|
|
2023-11-22 16:41:22 |
Sekoia: Dernier paysage cyber-menace du secteur financier Sekoia: Latest in the Financial Sector Cyber Threat Landscape (lien direct) |
Le phishing, les logiciels malveillants, les ransomwares, les attaques de chaîne d'approvisionnement, les violations de données et les attaques liées à la crypto figurent parmi les menaces les plus évolutives du secteur financier, explique Sekoia.
Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia. |
Threat
Ransomware
Malware
Studies
|
|
★★★
|
|
2023-10-17 20:14:06 |
Le nouveau rapport NetSkope expose une utilisation croissante des applications cloud pour répandre les logiciels malveillants New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware (lien direct) |
Microsoft OneDrive représente 26% de l'utilisation globale des applications de stockage cloud pour héberger des logiciels malveillants, devant Microsoft PowerPoint et GitHub.
Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub. |
Malware
Cloud
Studies
|
|
★★★★
|
|
2023-07-13 19:19:58 |
Gartner: En raison du stress, la moitié des cyber-dirigeants changeront d'emploi, et un quart quittera le terrain Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field (lien direct) |
Parmi les propositions stratégiques dans les perspectives de cybersécurité de Gartner \\ en 2023-2024, les organisations doivent instituer des changements culturels à une baisse de pression sur les équipes de sécurité.
Among the strategic propositions in Gartner\'s 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams. |
Studies
|
|
★★★
|
|
2021-02-26 21:43:00 |
The hidden business costs of working remotely (lien direct) |
The benefits of working remotely are numerous, but studies are finding there are significant hidden costs that need to be factored in. |
Studies
|
|
|
|
2020-08-31 17:43:00 |
IBM RXN: AI combined with robotics to speed molecular studies and chemical research (lien direct) |
AI and robotics are working together to find cures for diseases more quickly. Even if you're not in science, you can learn from this project. |
Studies
|
|
|
|
2020-06-04 19:21:55 |
Permanent remote work may also mean a pay cut (lien direct) |
Studies show that many employees would be amenable to a cost-of-living adjustment and that the benefits may offset the decrease. |
Studies
|
|
|
|
2020-05-22 16:14:34 |
Data researchers at odds: Will Americans opt in or out of COVID-19 contact tracing apps? (lien direct) |
Results from separate studies by Checkmarx and ExpressVPN reveal consumers won't easily share their personal information with tracing apps due to concern for misuse. |
Studies
|
|
|
|
2019-11-18 19:13:06 |
Three flaws in the Apple Watch heart health study (lien direct) |
Digging into the details of the Stanford study shows that digital clinical trials have some of the same problems that traditional studies do. |
Studies
|
|
|
|
2019-09-18 15:22:09 |
Virginia tech research team studies low latency military networks with DOD-funded grant (lien direct) |
Using a $7.5 million, five-year Multidisciplinary University Research Initiative grant, a Virginia Tech research team looks into the latency of military IoT systems. |
Studies
|
|
|
|
2019-09-10 19:22:01 |
Women\'s health arrives on Apple Health priority list (lien direct) |
Inspired by the Apple Heart Study, the company launches new studies of women's health, movement, and hearing. Data will come from apps on the new Apple Watch Series 5. |
Studies
|
|
★★★★
|
|
2018-08-27 22:31:00 |
How to implement VMware Pulse IoT Center: 3 case studies (lien direct) |
Customers including CSX, GE Research, and VMware itself explained how they deployed VMware Pulse IoT Center to manage their connected initiatives. |
Studies
|
|
|
|
2018-07-09 17:16:02 |
Robots will steal your white collar office job, too: 3 case studies (lien direct) |
While much attention has focused on automation taking away blue collar jobs, several others are also at risk. |
Studies
|
|
|
|
2018-07-06 14:38:00 |
25% of employees admit that they use the same password for everything (lien direct) |
Cybersecurity policies and procedures are effective only if they're followed--and studies continue to show that security best practices are routinely ignored. It's time for a better approach. |
Studies
|
|
★★★★
|