Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 20:30:00 |
#InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks? (lien direct) |
A panel of experts discussed practical strategies to implement security on a budget |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 18:00:00 |
#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working (lien direct) |
Securing end points is just one challenge facing firms in the legal sector |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 18:00:00 |
#InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering (lien direct) |
Securing endpoints is just one challenge facing firms in the legal sector |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 17:00:00 |
#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News? (lien direct) |
Ian Hill hosted a roundtable discussion on disinformation warfare |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 14:52:00 |
#InfosecurityEurope2022: The NCSC Sets Out the UK\'s Cyber Threat Landscape (lien direct) |
Marsha Quallo-Wright, deputy director for critical national infrastructure at the NCSC, discusses the latest cyber threat trends impacting the UK |
Threat
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 13:15:00 |
#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering (lien direct) |
Jenny Radcliffe, The People Hacker, points to what cybersecurity can learn from a social engineer |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 12:00:00 |
#InfosecurityEurope2022: Firms Look To Align Security and Business Risk (lien direct) |
Boards increasingly expect to see a return on their investment in cybersecurity |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 10:02:00 |
#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security (lien direct) |
Having metrics in place is crucial to tailoring staff awareness training programs effectively |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 09:40:00 |
Cloud Email Threats Soar 101% in a Year (lien direct) |
Experts warn of evolving social engineering techniques |
Threat
|
|
★★★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 09:00:00 |
Less Than Half of Organizations Have Open Source Security Policy (lien direct) |
Time taken to fix bugs has doubled over past three years |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 09:00:00 |
#InfosecurityEurope2022: Are You Prepared For The Next Big Crisis? (lien direct) |
Simon Dyson from NHS Digital explained how teams can boost awareness of cyber risks across their organizations |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 08:20:00 |
Russia Steps Up Cyber-Espionage Against Ukraine Allies (lien direct) |
Microsoft warns of “defensive weaknesses” in European governments |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-23 07:00:00 |
#InfosecurityEurope2022: The Power of Narrative in Highlighting OT System Risks (lien direct) |
Nigel Stanley and other security leaders discussed how to manage OT system risks |
Guideline
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 15:00:00 |
#InfosecurityEurope2022: Tackling Widespread Data Breaches from Third Parties (lien direct) |
Third-party risks can be reduced but not eliminated, panel says |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 14:00:00 |
#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives (lien direct) |
During a presentation, Keith Martin explained crucial ways we depend on cryptographic technology |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 12:54:00 |
#Infosec22: Lessons Learned from Career on the Security Front Line (lien direct) |
Developments in technology are making it harder for security services to gather intelligence or detect espionage, according to a former head of MI5 |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 10:30:00 |
Identity-Related Breaches Hit 84% of US Firms in 2021 (lien direct) |
Cloud adoption driving volume of corporate credentials |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 08:32:00 |
Yodel Cyber Incident Disrupts UK Deliveries (lien direct) |
Experts suspect ransomware as the cause |
Ransomware
|
|
★★★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 08:30:00 |
Euro Cops Dismantle Multimillion-Dollar Phishing Gang (lien direct) |
Europol trumpets Dutch and Belgian police work |
|
|
★★★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-22 07:00:00 |
#InfosecurityEurope2022: Geopolitical Tensions a "Danger" to Cybersecurity (lien direct) |
During a keynote talk, Mischa Glenny explained challenges geopolitical tensions create for cybersecurity |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 18:30:00 |
#InfosecurityEurope2022 Firms Face Emerging Threats as Bad Actors Evade Defenses (lien direct) |
The cyber-threat landscape continues to evolve at a breakneck pace |
Threat
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 17:00:00 |
#InfosecurityEurope2022 Cooperation Necessary to Strengthen Cyber Strategies (lien direct) |
The panel also discussed how to build leadership resilience to cope with disruptive changes |
Guideline
|
|
★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 16:30:00 |
(Déjà vu) New ToddyCat APT targets MS Exchange servers in Europe, Asia (lien direct) |
The APT actor would be utilizing two formerly unknown tools Kaspersky called 'Samurai backdoor' and 'Ninja Trojan' respectively. |
Tool
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 16:00:00 |
Cloudflare Outage Knocks Hundreds of Websites Offline (lien direct) |
The list is extensive and includes technology giants such as Discord, Medium, Coinbase, NordVPN and Feedly |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 15:30:00 |
New DFSCoerce NTLM Relay Attack Enables Hackers to Perform Windows Domain Takeover (lien direct) |
Assuming the identity of a domain, threat actors could then execute arbitrary commands |
Threat
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 15:00:00 |
#InfosecurityEurope2022 Defense Looks to Bring Cyber Into the Mainstream (lien direct) |
UK forces need talent and skills to allow the UK to counter cyber-threats and defend its interests |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 14:10:00 |
#InfosecurityEurope2022 Ransomware: Payment Decisions Finely Balanced (lien direct) |
Firms need to weigh up operational, ethical and financial issues when deciding whether to pay ransomware, according to experts |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 08:30:00 |
US Bank Data Breach Impacts Over 1.5 Million Customers (lien direct) |
Flagstar reveals details of December incident |
Data Breach
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-21 08:01:00 |
Researchers Reveal 56 OT Bugs in "Icefall" Report (lien direct) |
Forescout warns of widespread “insecure-by-design” practices |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 17:30:00 |
Google Chrome Extensions Could Be Used to Track Users Online (lien direct) |
New website can check for installed Chrome extensions and generate a fingerprint of a visiting user |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 17:00:00 |
Former Amazon Worker Convicted of Capital One Data Breach (lien direct) |
The software engineer intended to mine the stolen data and install cryptocurrency miners on some AWS servers |
Data Breach
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 15:30:00 |
BRATA Android Malware Group Now Classified As Advanced Persistent Threat (lien direct) |
BRATA now targeting a specific financial institution at a time |
Malware
Threat
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 11:45:00 |
Governance Gap Raises AI Security Concerns (lien direct) |
Cyber now seen as most important component for adoption |
|
|
★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 11:15:00 |
QNAP Customers Hit by Double Ransomware Blitz (lien direct) |
Taiwanese manufacturer braced for twin threat |
Ransomware
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-20 10:00:00 |
Investigators Disrupt Giant RSocks Botnet (lien direct) |
Russian cyber-criminals rented it out to other groups |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-17 17:00:00 |
Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update (lien direct) |
Host devices might lose connection to the internet after client device connects |
|
|
★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-17 16:30:00 |
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes (lien direct) |
Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims |
|
|
★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-17 16:00:00 |
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability (lien direct) |
The code injection vulnerability allowed attackers to call methods in various Ninja Forms classes |
Vulnerability
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-17 09:30:00 |
Experts Discuss Next Steps in Trust, Privacy and Security (lien direct) |
The complex interrelation between trust, privacy and cybersecurity was discussed by experts during Okta Forum 2022 |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-17 08:30:00 |
UK Proposes Post-Brexit Data Laws to Boost Innovation (lien direct) |
Proposals designed to unlock businesses' ability to use data and clamp down on nuisance calls and cookie pop-ups |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 18:00:00 |
Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data (lien direct) |
Most dangerous are spyware tools capable of stealing information from other apps' notifications |
Tool
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 17:00:00 |
NakedPages Phishing Toolkit is Now Available on Cybercrime Forums (lien direct) |
The toolkit is reportedly fully automated and comes preloaded with more than 50 phishing templates and site projects |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 16:30:00 |
Office 365 Functionality Could Allow Ransomware to Hold Files Stored on SharePoint and OneDrive (lien direct) |
Malicious actors could reduce versioning limit of files to a low number and encrypt them more times than versioning limit |
Ransomware
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 09:30:00 |
Cyber-Criminals Smuggle Ukrainian Men Across Border (lien direct) |
Researchers also warn of surge in travel-related fraud |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 09:04:00 |
Global Police Arrest Thousands in Fraud Crackdown (lien direct) |
Interpol claims to have intercepted $50m in illicit funds |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-16 09:00:00 |
Corporate Network Access Selling for Under $1000 on Dark Web (lien direct) |
RDP is the main access vector for brokers |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-15 16:30:00 |
BeanVPN leaks 25 million user records (lien direct) |
The cache of 18.5GB connection logs allegedly contained more than 25 million records |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-15 16:00:00 |
SAP Patches Critical NetWeaver and ABAP Platform Vulnerabilities (lien direct) |
SAP confirmed most of the vulnerabilities have now available fixes, and advised companies to update their systems as soon as possible. |
|
|
★★★★★
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-15 15:00:00 |
US Researchers Spot New Hertzbleed Flaw Affecting AMD and Intel CPUs (lien direct) |
New side-channel attacks reportedly use frequency side channels to extract cryptographic keys |
|
|
|
![InfoSecurityMag.webp](./Ressources/img/InfoSecurityMag.webp) |
2022-06-15 09:00:00 |
BNPL Fraud Alert as Account Takeovers Surge (lien direct) |
Buy now, pay later services represent an increasingly attractive target |
|
|
|