What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Netskope.webp 2022-11-23 07:00:00 What Does The Twitter Chaos Tell Us About The Security Of Our Data? (lien direct) >What a few weeks it has been for Twitter, from the sacking of half its workforce, and the rushed release of a new feature that allows impersonation of people and brands, through to the unintentional lock out of some users with a certain multi-factor authentication (MFA) configuration enabled. Added to this, we have also seen […] ★★★
Netskope.webp 2022-11-22 17:34:43 Netskope Threat Labs: What We\'ll See In 2023 (lien direct) Continuing our ongoing series of expert predictions, the following come from Netskope Threat Labs, including what we see on the horizon for software supply chain, phishing, and ransomware.  Phishing operations will increase in sophistication to bypass MFA Phishing is a social engineering technique. You need to find someone with their guard down and convince them […] Threat ★★★★
Netskope.webp 2022-11-21 19:35:03 Framing the Modern Conversation Around Digital Transformation and Digital Risk (lien direct) >Following my recent AISA session about security transformation in October, I am digging further into the value that can come from both security and digital transformation, applying security service edge capabilities and zero trust principles as part of the broader digital transformation strategy..  In the first part of this three-part blog series, I am going […] General Information ★★★
Netskope.webp 2022-11-18 15:18:03 Netskope Threat Coverage: Prestige Ransomware (lien direct) >Summary In October 2022, a novel ransomware named Prestige was found targeting logistics and transportation sectors in Ukraine and Poland. According to Microsoft, victims affected by Prestige overlap with previous victims targeted by HermeticWiper, spotted in February 2022.  The research also shows that the attackers deployed the ransomware within an hour between all victims, abusing […] Ransomware Threat
Netskope.webp 2022-11-17 14:09:34 What We See for 2023-Predictions for Cloud Security & Beyond (lien direct) As the new year draws closer, we’ve asked our experts here at Netskope to see what they have on their radar for 2023. Similar to years past, we've broken these predictions out into “Long Shots,” more out-there predictions we think could potentially happen in the next year, and “Trending Topics,” predictions around topics you may […]
Netskope.webp 2022-11-16 14:00:00 Cloud Abuse: New Technique Using Adobe Acrobat to Host Phishing (lien direct) >Summary Netskope Threat Labs recently discovered a phishing campaign that is abusing Adobe Acrobat to host a Microsoft Office phishing page. While abusing free cloud services to host malicious content is a popular attack technique, this is the first time we have seen Adobe Acrobat used to deliver malicious content.  The attack starts with a […] Threat
Netskope.webp 2022-11-16 07:00:00 Netskope: Cloud Services Vendor Of The Year (lien direct) >Last week Netskope was awarded the “Cloud Services Vendor Of The Year” trophy at the UK's CRN Awards. It is the second award we have won for our efforts in the UK channel this year – earlier in the summer we took home CRN's “Technology Innovation” gong as well.  Now that the dust has settled-and […]
Netskope.webp 2022-11-15 19:48:53 Deep Learning for Phishing Website Detection (lien direct) >Introduction Phishing is one of the most common online security threats. A phishing website tries to mimic a legitimate page in order to obtain sensitive data such as usernames, passwords, or financial and health-related information from potential victims.  Machine learning (ML) algorithms have been used to detect phishing websites, as a complementary approach to signature […]
Netskope.webp 2022-11-10 14:00:00 New Phishing Technique Targeting Over 20 Crypto Wallets (lien direct) >Summary Netskope Threat Labs spotted a new crypto-phishing attack that aims to steal sensitive data from crypto wallets, including private keys and security recovery phrases, disguising itself as a service to revoke stolen ERC (Ethereum Request for Comments) assets. The page was created and hosted with Netlify, which is a free cloud service to create […] Threat ★★★★★
Netskope.webp 2022-11-09 14:00:00 BlackCat Ransomware: Tactics and Techniques From a Targeted Attack (lien direct) >Summary BlackCat (a.k.a. ALPHV and Noberus) is a Ransomware-as-a-Service (RaaS) group that emerged in November 2021, making headlines for being a sophisticated ransomware written in Rust. It has both Windows and Linux variants and the payload can be customized to adapt to the attacker's needs. BlackCat is also believed to be the successor of the […] Ransomware
Netskope.webp 2022-11-08 15:05:13 The Key Mechanics of Building a Good Security Business Case (lien direct) >As we enter the thick of budget season, especially in a time where budgets are expected to start tightening, security and IT leaders need to anticipate the discussions they are going to have  with executive leaders. This means proactively preparing a formal business case for the security program to ensure funding for upcoming projects. But, […] Guideline
Netskope.webp 2022-11-07 07:00:00 Remember, Remember: What Guy Fawkes and the Gunpowder Plot Can Teach Us About Modern Cyber Attacks (lien direct) >10 years ago I moved to the UK and made it my home, and I love living here. I like Marmite, debates over whether the evening meal is dinner, tea, or supper, the constant requirement to remark upon the weather… and the many bizarre traditions. One of these bizarre traditions is Bonfire Night, celebrated on […]
Netskope.webp 2022-11-03 17:04:14 Netskope and Okta: Coming Together for Continuous Adaptive Trust (lien direct) >Challenges from the modern workforce The problem of securing the modern workforce goes beyond occasional spats between IT and security. The real problems we see are  user credentials under constant attack, alongside attempts to harvest and exploit enterprise data. Plus the cloud resources that workforces need are tough to secure, especially when deployed outside of […] ★★
Netskope.webp 2022-11-03 15:05:11 Cloud Threats Memo: Exploiting Google Forms for Phishing Campaigns (lien direct) >A recent campaign, unearthed by researchers at INKY, is the latest example of exploitation of a legitimate cloud service. The campaign impersonates the U.S. Small Business Administration (SBA), targeting small businesses that are unaware of the fact that the SBA recently stopped accepting applications for COVID-19 relief loans or grants. The element that makes this […] ★★★★
Netskope.webp 2022-11-02 06:00:00 Is Digital Distrust The Answer? (lien direct) >“Digital trust” is a hot topic at the moment-with McKinsey as the latest to dive into the term. The consultancy's “Why Digital Trust Matters” report presents global research among business leaders and consumers, exploring consumer perceptions of digital trust, and the behaviours it motivates. McKinsey defines digital trust as “the confidence in an organisation to […] Guideline ★★
Netskope.webp 2022-11-01 16:35:10 Cybersecurity Awareness Month: Recognizing Phishing and Using Multi-factor Authentication (lien direct) >Phishing is a well known threat that users are constantly being warned about, but as we are in Cybersercurity Awarenss Month though, some may still be wondering what exactly phishing is and how to prevent it. In this blog, I am going to dig into how you can recognize phishing and how enabling multi-factor authentication […] Threat ★★★★
Netskope.webp 2022-10-20 20:03:52 Making Sense of Zero Trust Through the Lens of Networking and Infrastructure (lien direct) >“Zero trust” still confuses people-and for good reason. While the term conveys a certain absolute authority (“zero,” “nope,” “nothing”), contemporary approaches offer much more nuanced capabilities. And while zero trust today is typically associated with security initiatives, the concepts have their origin in the definition of network perimeters, who is granted access, and how that […]
Netskope.webp 2022-10-19 19:45:51 Cybersecurity Awareness Month: Answering 3 Big Questions About Secure Passwords (lien direct) >Passwords have been employed by many since the days of the Roman Empire, and they quickly became omnipresent as we approached the digital age. However, rapid changes in the security landscape have forced us to evolve what our passwords look like and how they are used. At times, this has led to conflicting advice and […]
Netskope.webp 2022-10-19 06:00:00 Looking Back at the Last Decade of Technology (lien direct) >Here at Netskope we are celebrating our 10th anniversary this month, but while our story over that decade is very cool, any blog about it will be of limited interest outside of our own employee base. I wanted to add a different lens to our internal observations and so I started to refresh my memory […]
Netskope.webp 2022-10-18 18:08:12 Longtime Netskopers Reflect on 10 Years of Netskope (lien direct) >As Netskope celebrates 10 years as a company this month, we reached out to some longtime Netskopers, asking them to reflect on their time here with this question: “Reflecting on your time at Netskope, what has it been like watching the company evolve/change? What excites you about the future of Netskope?” Here are some of […]
Netskope.webp 2022-10-13 14:35:47 Key Takeaways from the Just-Published Gartner Market Guide for Single-Vendor SASE (lien direct) >Secure access service edge (SASE), as an architecture, is only three years old, but rapid adoption by organizations is making SASE one of the fastest-growing technology market categories in history. Functionally, SASE will change-and is already changing-how teams make security and networking technology purchases. Gartner® predicts that by 2025, 50% of new SD-WAN purchases will […]
Last update at: 2024-06-23 02:10:26
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter