Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-10-19 12:00:00 |
Operationalizing MITRE ATT&CK: A New Wave is Here (lien direct) |
If you want to build and maintain a heatmap of your organization's detection coverage, it requires a mixture of art, science, and actionable transparency from your security vendors. Today, the MITRE ATT&CK Framework has become the de-facto language for how we communicate, analyze, and attribute adversary activity. |
|
|
|
|
2022-10-18 18:47:44 |
Malicious Life Podcast: Hacking Stock Markets Part 2 (lien direct) |
|
|
|
|
|
2022-10-18 15:53:02 |
Telcos: The Supply Chain Attack You\'re Not Ready For (lien direct) |
|
|
|
|
|
2022-10-12 14:30:05 |
Indicators of Behavior and the Diminishing Value of IOCs (lien direct) |
|
|
|
|
|
2022-10-11 13:51:43 |
Why NGAV Displaced Traditional Antivirus Tools (lien direct) |
Next-generation antivirus (NGAV) solutions are quickly replacing outmoded signature-based antivirus tools, and ransomware has a lot to do with it. Traditional AV tools fall short considering what we're up against when we look at the true cost of ransomware attacks for business, and why this change was inevitable. |
Ransomware
|
|
|
|
2022-10-11 13:13:14 |
Malicious Life Podcast: Vishing Voice Scams (lien direct) |
|
|
|
|
|
2022-10-06 14:21:59 |
Cybersecurity Accountability Regulation? Your Opinion Matters… (lien direct) |
Harvard Business Review (HBR) recently published an article that tackles the same topic as the latest Cyber Defenders Council report: cybersecurity regulation. The HBR article explores the complexities of incident reporting regulation, while the Cyber Defenders Council report delves into the pros and cons of cybersecurity accountability regulation. |
|
|
|
|
2022-10-06 14:11:03 |
Ten Ways to Make Your Security Operations More Efficient (lien direct) |
|
|
|
|
|
2022-10-05 14:27:36 |
Container Escape: All You Need is Cap (Capabilities) (lien direct) |
|
|
|
|
|
2022-10-05 14:18:33 |
Leveraging Indicators of Behavior for Early Detection (lien direct) |
|
|
|
|
|
2022-10-04 14:57:39 |
Blue Teaming on macOS with eslogger (lien direct) |
|
|
|
|
|
2022-10-04 14:51:23 |
Malicious Life Podcast: Hacking Stock Markets Part 1 (lien direct) |
In any trading market–at any time in history, no matter where you are–the most important thing you can possess isn't actually money, or influence, or anything like that. Knowledge– in particular, knowing something before everybody else–is far more valuable.
|
|
|
|
|
2022-10-03 20:06:57 |
THREAT ALERT: ProxyNotShell - Two Critical Vulnerabilities Affecting MS Exchange (lien direct) |
|
|
|
|
|
2022-10-03 19:54:00 |
A Guide to More Efficient and Effective SOC Teams (lien direct) |
|
|
|
|
|
2022-10-03 15:23:27 |
Malicious Life Wins Big at the 17th Annual People\'s Choice Podcast Awards (lien direct) |
|
|
|
|
|
2022-09-30 15:51:41 |
Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks (lien direct) |
|
Ransomware
|
|
|
|
2022-09-29 14:45:37 |
Cloud Authentication: A Guide to Choosing the Right Solution (lien direct) |
|
|
|
|
|
2022-09-29 10:00:00 |
Webinar October 13th 2022: Ten Considerations for More Efficient Security (lien direct) |
|
|
|
|
|
2022-09-28 14:52:19 |
Malicious Life Podcast: What It\'s Like to Fight LulzSec (lien direct) |
|
|
|
|
|
2022-09-27 14:44:26 |
White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection (lien direct) |
|
|
|
|
|
2022-09-27 14:43:58 |
Defending Against Supply Chain and Ransomware Attacks (lien direct) |
“The level of damage associated with ransomware-based supply chain attacks has never been higher,” warned a recent article. These attacks are so disruptive because, as one consultancy firm revealed, the average company has 3,000 suppliers per $1 billion US in spend. That means when it comes to ransomware attacks, you're considering the security of up to thousands of other networks besides your own. |
Ransomware
|
|
|
|
2022-09-26 20:21:17 |
Cybereason Announces Private Infrastructure Protection Version 21.2 (lien direct) |
|
|
|
|
|
2022-09-22 12:30:00 |
Next Generation Antivirus Prevention Redefined (lien direct) |
|
|
|
|
|
2022-09-21 14:17:38 |
How XDR Reduces the Total Cost of Security Operations (lien direct) |
Ransomware is on the loose, with an attack occurring every 11 seconds on average and causing one in three affected organizations to shell out anywhere from $350,000 and $1.4 million. As ransomware gets both more accessible (RaaS) and increasingly sophisticated (RansomOps), security requirements need to advance along with it. |
Ransomware
|
|
|
|
2022-09-21 14:09:25 |
Webinar October 26th 2022: NGAV Redefined (lien direct) |
|
|
|
|
|
2022-09-20 12:00:00 |
Cyber Defenders Council: Is it Time for Cybersecurity Regulation? (lien direct) |
|
|
|
|
|
2022-09-20 08:00:00 |
Preparing Your Organization for a Ransomware Attack (lien direct) |
As ransomware gangs continue moving towards highly targeted attacks, enterprises need to be more wary than ever about making sure their organizations are as prepared as possible to defend against a ransomware attack. RansomOps are now the modus operandi among even the biggest players, and it's changing the game. |
Ransomware
|
|
|
|
2022-09-20 07:00:00 |
Workforce Challenges are Here to Stay: Time to Think about MDR (lien direct) |
|
|
|
|
|
2022-09-19 14:54:12 |
Malicious Life Podcast: King Kimble - Kim DotCom (lien direct) |
|
|
|
|
|
2022-09-15 13:33:19 |
Ransomware Head to Head: Don\'t Follow the CRWD (lien direct) |
|
|
|
|
|
2022-09-14 18:33:43 |
THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence (lien direct) |
|
|
|
|
|
2022-09-14 14:18:22 |
AI/ML as a Security Team Force Multiplier (lien direct) |
|
|
|
|
|
2022-09-14 14:14:41 |
Reimagining the SOC: A Lesson From the Military on 9/11 (lien direct) |
To sustain the fight against a decentralized global enemy in cyberspace, the modern Security Operations Center (SOC) must engage in a change management experiment to become more agile and reimagine the tools and processes at its disposal.
|
|
|
|
|
2022-09-13 14:38:40 |
Malicious Life Podcast: Hacking Multi-Factor Authentication (lien direct) |
|
|
|
|
|
2022-09-13 14:25:15 |
Leveraging XDR for Cloud Workload Protection (lien direct) |
The worldwide public cloud computing market is projected to reach nearly $500 billion USD this year, with projections to clear nearly $600 billion next year. It's no surprise, given that nine out of ten survey respondents reported using at least one cloud service. |
|
|
|
|
2022-09-08 10:00:00 |
THREAT ANALYSIS REPORT: PlugX RAT Loader Evolution (lien direct) |
|
|
|
|
|
2022-09-07 15:48:39 |
The Cybereason Approach to Sensor Tamper Protection (lien direct) |
|
|
|
|
|
2022-09-07 14:38:20 |
How XDR Solves Key Challenges Facing Security Teams (lien direct) |
|
|
|
|
|
2022-09-06 15:01:28 |
Malicious Life Podcast: Hacking Language Models (lien direct) |
Language models are everywhere today: they run in the background of Google Translate and other translation tools, they help operate voice assistants like Alexa or Siri, and most interestingly they are available via several experiential projects trying to emulate natural conversations such as OpenAI's GPT-3 and Google's LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? Check it out... |
|
|
|
|
2022-09-06 14:20:24 |
RansomOps vs. Extended Detection and Response (lien direct) |
With nearly four out of ten global organizations admitting to being victims of a ransomware attack in 2021 alone, it's apparent that complex ransomware operations–or RansomOps–are only going to become a bigger part of the cybersecurity dialogue than they already are. |
Ransomware
|
|
|
|
2022-09-01 15:31:18 |
Attack on Montenegro Further Evidence of Nation-State and Cybercriminal Crossover (lien direct) |
|
|
|
|
|
2022-09-01 10:00:00 |
THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector (lien direct) |
|
Ransomware
|
|
|
|
2022-08-31 15:08:31 |
Malicious Life Podcast: Software Bill of Materials (SBOM) (lien direct) |
|
|
|
|
|
2022-08-31 14:41:39 |
The Importance of Actionable Threat Intelligence (lien direct) |
|
Threat
|
|
|
|
2022-08-30 15:11:46 |
(Déjà vu) Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies (lien direct) |
|
Ransomware
|
|
|
|
2022-08-30 14:08:01 |
Hackers vs. Attackers: It\'s Not Always Black and White (lien direct) |
|
|
|
|
|
2022-08-25 16:28:29 |
Cybereason MDR: Fast, Efficient, Effective (lien direct) |
|
|
|
|
|
2022-08-22 19:06:21 |
THREAT ALERT: HavanaCrypt Ransomware Masquerading as Google Update (lien direct) |
|
Ransomware
|
|
|
|
2022-08-22 14:07:12 |
Malicious Life Podcast: Leo Kuvayev– The Czar of Spammers (lien direct) |
Criminals, particularly cybercriminals, aren't “good people,” but in most cases, they do have their own personal boundaries, so every once in a while you encounter a criminal who's different–someone who seems not to have limits at all. A ruthless person, for whom the end truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far - check it out...
|
|
|
|
|
2022-08-19 14:57:16 |
THREAT ALERT: Inside the Redeemer 2.0 Ransomware (lien direct) |
The Cybereason Global Security Operations Center (SOC) Team issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them. In this article, the Cybereason Research team exposes Redeemer 2.0, an updated version of the original ransomware. |
Threat
Ransomware
|
|
|