What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
knowbe4.webp 2023-08-14 14:56:30 Les logiciels malveillants de Gootloader utilisent l'ingénierie sociale pour cibler les cabinets d'avocats (ou leurs clients)
Gootloader Malware Uses Social Engineering to Target Law Firms (or their Clients)
(lien direct)

Gootloader Malware Uses Social Engineering to Target Law Firms (or their Clients)
Malware ★★
knowbe4.webp 2023-08-11 12:21:30 Comcast: 9 tentatives sur 10 pour violer les réseaux de clients commencent par un phish
Comcast: 9 out of 10 Attempts to Breach Customer Networks Start with a Phish
(lien direct)

Comcast: 9 out of 10 Attempts to Breach Customer Networks Start with a Phish
★★
knowbe4.webp 2023-08-10 18:39:58 Le rôle de l'AI \\ dans la cybersécurité: Black Hat USA 2023 révèle comment les grands modèles de langage façonnent l'avenir des attaques de phishing et de la défense
AI\\'s Role in Cybersecurity: Black Hat USA 2023 Reveals How Large Language Models Are Shaping the Future of Phishing Attacks and Defense
(lien direct)
 Rôle Ai \\ dans la cybersécurité: Black Hat USA 2023 révèle la façon dont les modèles de langue façonnentL'avenir des attaques de phishing et de la défense à Black Hat USA 2023, une session dirigée par une équipe de chercheurs en sécurité, dont Fredrik Heiding, Bruce Schneier, Arun Vishwanath et Jeremy Bernstein, ont dévoilé une expérience intrigante.Ils ont testé de grands modèles de langue (LLM) pour voir comment ils ont fonctionné à la fois dans l'écriture de courriels de phishing convaincants et les détecter.Ceci est le PDF document technique . L'expérience: l'élaboration des e-mails de phishing L'équipe a testé quatre LLM commerciaux, y compris le chatppt de l'Openai \\, Bard de Google \\, Claude \\ de Google et Chatllama, dans des attaques de phishing expérimentales contre les étudiants de Harvard.L'expérience a été conçue pour voir comment la technologie de l'IA pouvait produire des leurres de phishing efficaces. Heriding, chercheur à Harvard, a souligné qu'une telle technologie a déjà eu un impact sur le paysage des menaces en facilitant la création de courriels de phishing.Il a dit: "GPT a changé cela. Vous n'avez pas besoin d'être un orateur anglais natif, vous n'avez pas besoin de faire beaucoup. Vous pouvez entrer une invite rapide avec seulement quelques points de données." L'équipe a envoyé des e-mails de phishing offrant des cartes-cadeaux Starbucks à 112 étudiants, en comparant Chatgpt avec un modèle non AI appelé V-Triad.Les résultats ont montré que l'e-mail V-Triad était le plus efficace, avec un taux de clic de 70%, suivi d'une combinaison V-Triad-Chatgpt à 50%, Chatgpt à 30% et le groupe témoin à 20%. Cependant, dans une autre version du test, Chatgpt a fonctionné beaucoup mieux, avec un taux de clic de près de 50%, tandis que la combinaison V-Triad-Chatgpt a mené avec près de 80%.Heriding a souligné qu'un LLM non formé et à usage général a pu créer rapidement des attaques de phishing très efficaces. Utilisation de LLMS pour la détection de phishing La deuxième partie de l'expérience s'est concentrée sur l'efficacité des LLM pour déterminer l'intention des e-mails suspects.L'équipe a utilisé les e-mails de Starbucks de la première partie de l'expérience et a demandé aux LLM de déterminer l'intention, qu'elle ait été composée par un humain ou une IA, d'identifier tout aspect suspect et d'offrir des conseils sur la façon de répondre. Les résultats étaient à la fois surprenants et encourageants.Les modèles avaient des taux de réussite élevés dans l'identification des e-mails marketing, mais ont eu des difficultés avec l'intention des e-mails de phishing V-Triad et Chatgpt.Ils se sont mieux comportés lorsqu'ils sont chargés d'identifier le contenu suspect, les résultats de Claude \\ étant mis en évidence pour non seulement pour obtenir des résultats élevés dans les tests de détection mais aussi fournir des conseils judicieux pour les utilisateurs. La puissance de phishing de LLMS Dans l'ensemble, Heriding a conclu que les LLMS prêtesété formé sur toutes les données de sécurité.Il a déclaré: "C'est vraiment quelque chose que tout le monde peut utiliser en ce moment. C'est assez puissant." L'expér Tool Threat ChatGPT ChatGPT ★★
knowbe4.webp 2023-08-10 15:44:01 Chapeau noir: "cinq cyber phases de la guerre hybride de la Russie"
Black Hat: "Five cyber phases of Russia\\'s hybrid war"
(lien direct)
Black Hat: ★★
knowbe4.webp 2023-08-09 17:55:02 Les nouvelles exigences de mot de passe PCI pourraient être l'impulsion pour les escroqueries de récolte des informations d'identification
New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams
(lien direct)

New PCI Password Requirements Could Be the Impetus for Credential Harvesting Scams
★★
knowbe4.webp 2023-08-08 12:36:07 5 façons intrigantes de l'IA change le paysage des cyberattaques
5 Intriguing Ways AI Is Changing the Landscape of Cyber Attacks
(lien direct)
★★
knowbe4.webp 2023-08-08 12:00:00 [Infographie] Q2 2023 Résultats des tests de phishing de premier clique
[INFOGRAPHIC] Q2 2023 Top-Clicked Phishing Test Results Favor HR-Related Subjects
(lien direct)
★★
knowbe4.webp 2023-08-07 11:39:14 Les attaques d'extorsion de vol de données augmentent de 25% en seulement un quart et prennent la première place d'attaque
Data Theft Extortion Attacks Rise 25 Percent in Just One Quarter and Take Top Attack Spot
(lien direct)

Data Theft Extortion Attacks Rise 25 Percent in Just One Quarter and Take Top Attack Spot
★★
knowbe4.webp 2023-08-07 11:39:05 Les attaques de phishing continuent d'utiliser les pièces jointes car les fichiers HTML contenant Java dominent
Phishing Attacks Continue to Use Attachments as HTML Files Containing Java Dominate
(lien direct)

Phishing Attacks Continue to Use Attachments as HTML Files Containing Java Dominate
★★
knowbe4.webp 2023-08-06 14:22:10 Les pirates russes ont violé les agences gouvernementales \\ 'MFA utilisant des équipes Microsoft: votre entreprise est-elle la prochaine?
Russian Hackers Breached Government Agencies\\' MFA Using Microsoft Teams: Is Your Business Next?
(lien direct)
 Les pirates russes ont violé les agences gouvernementales \\ 'MFA utilisant des équipes Microsoft: votre entreprise est-elle la prochaine? récent de Microsoft \\ Article de blog Les sourcils ont haussé les sourcils à travers la communauté de la cybersécurité.Les pirates d'État liés à la Russie, connus sous le nom d'APT29 ou confortable, ont exécuté des attaques de phishing «hautement ciblées» via la plate-forme des équipes de Microsoft \\.Ce sont les mêmes pirates derrière l'historique Solarwinds Hack en 2020 et la violation de 2016 du Comité national démocrate. La méthode était à la fois sophistiquée et alarmante.En compromettant les comptes Microsoft 365 appartenant à des petites entreprises, les pirates ont créé des domaines pour tromper leurs cibles via des messages Microsoft Teams.Ils ont engagé des utilisateurs et obtenu l'approbation des invites en MFA, contournant ce qui est généralement considéré comme une mesure de sécurité robuste. & Nbsp;
Russian Hackers Breached Government Agencies\' MFA Using Microsoft Teams: Is Your Business Next? Microsoft\'s recent blog post raised eyebrows through the cybersecurity community. State-backed hackers linked to Russia, known as APT29 or Cozy Bear, have executed “highly targeted” phishing attacks through Microsoft\'s Teams platform. These are the same hackers behind the historic SolarWinds hack in 2020 and the 2016 breach of the Democratic National Committee.The method was both sophisticated and alarmingly simple. By compromising Microsoft 365 accounts owned by small businesses, the hackers created domains to deceive their targets through Microsoft Teams messages. They engaged users and elicited approval of MFA prompts, bypassing what is usually considered a robust security measure. 
APT 29 APT 29 ★★★★
knowbe4.webp 2023-08-02 18:46:03 Le besoin urgent de cyber-résilience dans les soins de santé
The Urgent Need For Cyber Resilience in Healthcare
(lien direct)
Ransomware ★★
knowbe4.webp 2023-08-02 12:52:08 Bad Actor utilise un faux chat Android pour installer des logiciels malveillants
Bad Actor Uses Fake Android Chat to Install Malware
(lien direct)

Bad Actor Uses Fake Android Chat to Install Malware
Malware ★★
knowbe4.webp 2023-07-31 15:00:38 La CISA découvre que le phishing de lance et le compromis de compte valide sont les vecteurs d'attaque les plus courants
CISA Discovers Spear Phishing and Valid Account Compromise Are the Most Common Attack Vectors
(lien direct)
★★
knowbe4.webp 2023-07-29 13:12:49 Les chercheurs découvrent une méthode surprenante pour pirater les garde-corps des LLM
Researchers uncover surprising method to hack the guardrails of LLMs
(lien direct)

Researchers uncover surprising method to hack the guardrails of LLMs
Hack ★★★
knowbe4.webp 2023-07-27 18:26:27 Les numéros d'attaque par e-mail de phishing «baisse» tandis que les volumes de logiciels malveillants augmentent de 15%
Phishing Email Attack Numbers “Decline” While Malware Volumes Increase 15%
(lien direct)

Phishing Email Attack Numbers “Decline” While Malware Volumes Increase 15%
Malware ★★★
knowbe4.webp 2023-07-27 12:00:00 Comment Knowbe4 peut vous aider à lutter contre le phishing des lances
How KnowBe4 Can Help You Fight Spear Phishing
(lien direct)
knowbe4.webp 2023-07-26 19:21:29 Le nouveau rapport IBM révèle que le coût d'une violation de données dépasse désormais 4,45 millions de dollars
New IBM report reveals the cost of a data breach now tops $4.45 million
(lien direct)
 nouveau rapport IBM révèle que le coût d'une violation de données dépasse désormais 4,45 millions de dollars IBM Security a publié son coût annuel d'un rapport de violation de données, révélant que le coût moyen mondial d'une violation de données a atteint 4,45 millions de dollars en 2023. Cela marque une augmentation significative de 15% au cours des 3 dernières années, faisant deC'est le coût le plus enregistré dans l'histoire du rapport.Notamment, les coûts de détection et d'escalade ont connu une augmentation substantielle de 42% au cours de la même période, indiquant un passage à des enquêtes de violation plus complexes.
New IBM report reveals the cost of a data breach now tops $4.45 million IBM Security has released its annual Cost of a Data Breach Report, revealing that the global average cost of a data breach reached $4.45 million in 2023. This marks a significant increase of 15% over the past 3 years, making it the highest recorded cost in the history of the report. Notably, detection and escalation costs have seen a substantial rise of 42% during the same period, indicating a shift towards more complex breach investigations.
Data Breach ★★
knowbe4.webp 2023-07-20 19:25:40 Les soins de santé de l'Union européenne voit le nombre de cyber-incidents doubler en 2023
European Union Healthcare Sees the Number of Cyber Incidents Double in 2023
(lien direct)
Un nouveau rapport axé sur le secteur des soins de santé met en lumière l'état des cyberattaques de l'Union européenne, y compris les types d'attaques, les motivations ciblées de qui, et qui ont été responsables. .
EU Healthcare Sees the Number of Cyber Incidents Double in 2023 A new report focused on the healthcare sector sheds light on the state of cyber attacks in the European Union, including the types of attacks, who\'s targeted, motivations, and who\'s responsible.
★★
knowbe4.webp 2023-07-20 19:25:33 Le nombre de compromis de données saute de 50% dans H1 2023, dépassant chaque année
The Number of Data Compromises Jumps 50% in H1 2023, Outpacing Every Year on Record
(lien direct)
Les nouvelles données du Centre de ressources de vol d'identité (ITRC) couvrant le premier semestre de cette année montre une augmentation significative du nombre de cyberattaques réussies axées sur le vol de données d'entreprise.
The Number of Data Compromises Jumps 50% in H1 2023 Outpacing Every Year on Record New data from the Identity Theft Resource Center (ITRC) covering the first half of this year shows a significant rise in the number of successful cyber attacks focused on stealing corporate data.
★★
knowbe4.webp 2023-07-17 17:26:05 Wormpt, un générateur de texte de cybercriminalité "sans éthique"
WormGPT, an "ethics-free" Cyber Crime text generator
(lien direct)
Cyberwire a écrit: "Les chercheurs de Slashnext & nbsp; Décrire & nbsp; Un outil de cybercriminalité générateur d'IA appelé« Wormgpt », qui est annoncé sur les forums souterrains comme« une alternative Blackhat aux modèles GPT, conçue spécifiquement pour des activités malveillantes. "L'outil peut générer une sortie que les modèles d'IA légitimes essaient d'empêcher, tels que le code malware ou les modèles de phishing. & Nbsp;
WormGPT, an CyberWire wrote: "Researchers at SlashNext describe a generative AI cybercrime tool called “WormGPT,” which is being advertised on underground forums as “a blackhat alternative to GPT models, designed specifically for malicious activities.” The tool can generate output that legitimate AI models try to prevent, such as malware code or phishing templates. 
Malware Tool ★★
knowbe4.webp 2023-07-14 12:14:31 Près d'un quart de tous les e-mails sont considérés comme malveillants
Nearly One-Quarter of All Emails Are Considered to be Malicious
(lien direct)

Nearly One-Quarter of All Emails Are Considered to be Malicious
★★★
knowbe4.webp 2023-07-14 12:14:27 Détails bancaires malvertising Attack se déguise comme une annonce USPS USPS infaillible
Banking Detail Malvertising Attack Disguises Itself as a Foolproof USPS Google Ad
(lien direct)

Banking Detail Malvertising Attack Disguises Itself as a Foolproof USPS Google Ad
★★
knowbe4.webp 2023-07-13 20:39:42 [Découvert] une nouvelle attaque de désinformation de l'IA maléfique appelée \\ 'poisongpt \\'
[Discovered] An evil new AI disinformation attack called \\'PoisonGPT\\'
(lien direct)

[Discovered] An evil new AI disinformation attack called \'PoisonGPT\'
★★★
knowbe4.webp 2023-07-12 14:11:56 Les attaques de phishing utilisant des codes QR capturent les informations d'identification des utilisateurs
Phishing Attacks Employing QR Codes Are Capturing User Credentials
(lien direct)

Phishing Attacks Employing QR Codes Are Capturing User Credentials
★★★
knowbe4.webp 2023-07-11 13:00:00 Cyberheistnews Vol 13 # 28 [méfiez-vous] Microsoft Teams Exploit utilise l'ingénierie sociale pour répandre les logiciels malveillants
CyberheistNews Vol 13 #28 [Beware] Microsoft Teams Exploit Uses Social Engineering to Spread Malware
(lien direct)

CyberheistNews Vol 13 #28
Malware ★★
knowbe4.webp 2023-07-10 14:51:29 Nouveaux références de phishing déverrouillées: votre organisation est-elle d'avance sur la courbe en 2023
New Phishing Benchmarks Unlocked: Is Your Organization Ahead of the Curve in 2023
(lien direct)

New Phishing Benchmarks Unlocked: Is Your Organization Ahead of the Curve in 2023
★★
knowbe4.webp 2023-07-07 15:15:00 Le nombre de cas d'attaque de phishing à Singapour saute de 185%
The Number of Phishing Attack Cases in Singapore Jump by 185%
(lien direct)

The Number of Phishing Attack Cases in Singapore Jump by 185%
★★★
knowbe4.webp 2023-07-07 15:00:00 Smartwatch non sollicité gratuit dans le courrier et je suis dans l'armée?Qu'est ce qui pourrait aller mal???
Free Unsolicited Smartwatch in the Mail and I\\'m in the Military? What Could Possibly Go Wrong???
(lien direct)
Threat ★★
knowbe4.webp 2023-07-07 14:50:41 Le groupe Camaro Dragon apt continue d'employer des appareils USB comme vecteur d'attaque initial
Camaro Dragon APT Group Continues to Employ USB Devices as Initial Attack Vector
(lien direct)

Camaro Dragon APT Group Continues to Employ USB Devices as Initial Attack Vector
★★★
knowbe4.webp 2023-07-07 14:50:09 Les cyberattaques par e-mail en Europe augmentent 7 fois en un an seulement
Email-Based Cyber Attacks in Europe Increase 7-Fold in Just One Year
(lien direct)

Email-Based Cyber Attacks in Europe Increase 7-Fold in Just One Year
★★★
knowbe4.webp 2023-07-07 12:00:00 Microsoft Teams Cyber Attack Exploit Tool s'appuie sur l'ingénierie sociale pour fournir des logiciels malveillants
Microsoft Teams Cyber Attack Exploit Tool Relies on Social Engineering to Deliver Malware
(lien direct)
exploited Microsoft Teams CyberL'outil d'attaque s'appuie sur l'ingénierie sociale pour livrer des logiciels malveillants Si votre organisation utilise des équipes Microsoft, alors vous voulez vraiment entendre parler d'une nouvelle façon dont les mauvais acteurs exploitent cet outil de cyber-attaque nouvellement découvert.
Exploited Microsoft Teams Cyber Attack Tool Relies on Social Engineering to Deliver Malware If your organization uses Microsoft Teams, then you definitely want to hear about a new way bad actors are exploiting this newly discovered cyber attack tool.
Malware Tool ★★★
knowbe4.webp 2023-07-06 12:00:00 Nerve Center: Protégez votre réseau contre les nouvelles souches de ransomware avec notre dernière mise à jour RANSIM
Nerve Center: Protect Your Network Against New Ransomware Strains with Our Latest RanSim Update
(lien direct)
simulateur de ransomware gratuit ransomware continue d'être une menace majeure pour toutes les organisations et, selon le Verizon 2023 Data Breach Investigations Report , est toujours présent dans 24% des violations.
Free Ransomware Simulator Ransomware continues to be a major threat for all organizations and, according to the Verizon 2023 Data Breach Investigations Report, is still present in 24% of breaches.
Ransomware Data Breach Threat ★★
knowbe4.webp 2023-07-05 13:23:22 Le plus grand port du Japon est la dernière victime d'une attaque de ransomware
Japan\\'s Largest Port is the Latest Victim of a Ransomware Attack
(lien direct)

Japan\'s Largest Port is the Latest Victim of a Ransomware Attack
Ransomware ★★
knowbe4.webp 2023-07-05 13:00:00 Cyberheistnews Vol 13 # 27 [tête haute] La campagne de phishing d'identité massive imite plus de 100 marques et des milliers de domaines
CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains
(lien direct)
CyberheistNews Vol 13 #27 CyberheistNews Vol 13 #27  |   July 5th, 2023 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains A year-long phishing campaign has been uncovered that impersonates 100+ popular clothing, footwear, and apparel brands using at least 10 fake domains impersonating each brand. We\'ve seen plenty of attacks that impersonated a single brand along with a few domains used to ensure victims can be taken to a website that seeks to harvest credentials or steal personal information. But I don\'t think an attack of such magnitude as the one identified by security researchers at Internet security monitoring vendor Bolster. According to Bolster, the 13-month long campaign used over 3000 live domains (and another 3000+ domains that are no longer in use) to impersonate over 100 well-known brands. We\'re talking about brands like Nike, Guess, Fossil, Tommy Hilfiger, Skechers, and many more. Some of the domains have even existed long enough to be displayed at the top of natural search results. And these sites are very well made; so much so that they mimic their legitimate counterparts enough that visitors are completing online shopping visits, providing credit card and other payment details. The impersonation seen in this widespread attack can just as easily be used to target corporate users with brands utilized by employees; all that\'s needed is to put the time and effort into building out a legitimate enough looking impersonated website and create a means to get the right users to visit said site (something most often accomplished through phishing attacks). This latest impersonation campaign makes the case for ensuring users are vigilant when interacting with the web – something accomplished through continual Security Awareness Training. Blog post with links:https://blog.knowbe4.com/massive-impersonation-phishing-campaign [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us Wednesday, July 12, @ 2:00 PM (ET), for a live demonstra Malware Hack Threat Cloud ★★
knowbe4.webp 2023-06-29 17:18:18 L'utilisation de piscines d'exploitation de crypto pour blanchir les fonds de rançon augmente de 100 000% sur 5 ans
Use of Crypto Mining Pools to Launder Ransom Funds Grows 100,000% Over 5 Years
(lien direct)

Use of Crypto Mining Pools to Launder Ransom Funds Grows 100,000% Over 5 Years
★★
knowbe4.webp 2023-06-29 17:18:11 Acteur de menace iranienne Chichette Chichette à l'aide de la campagne de phishing de lance pour distribuer des logiciels malveillants
Iranian Threat Actor Charming Kitten Using Spear Phishing Campaign To Distribute Malware
(lien direct)
Malware Threat APT 35 ★★
knowbe4.webp 2023-06-28 15:16:46 Le National Cyber Security Center Notes Les cabinets d'avocats britanniques sont principaux pour les cybercriminels
National Cyber Security Centre Notes UK Law Firms are Main Target for Cybercriminals
(lien direct)

National Cyber Security Centre Notes UK Law Firms are Main Target for Cybercriminals
★★
knowbe4.webp 2023-06-27 13:00:00 Cyberheistnews Vol 13 # 26 [Eyes Open] La FTC révèle les cinq dernières escroqueries par SMS
CyberheistNews Vol 13 #26 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams
(lien direct)
CyberheistNews Vol 13 #26 CyberheistNews Vol 13 #26  |   June 27th, 2023 [Eyes Open] The FTC Reveals the Latest Top Five Text Message Scams The U.S. Federal Trade Commission (FTC) has published a data spotlight outlining the most common text message scams. Phony bank fraud prevention alerts were the most common type of text scam last year. "Reports about texts impersonating banks are up nearly tenfold since 2019 with median reported individual losses of $3,000 last year," the report says. These are the top five text scams reported by the FTC: Copycat bank fraud prevention alerts Bogus "gifts" that can cost you Fake package delivery problems Phony job offers Not-really-from-Amazon security alerts "People get a text supposedly from a bank asking them to call a number ASAP about suspicious activity or to reply YES or NO to verify whether a transaction was authorized. If they reply, they\'ll get a call from a phony \'fraud department\' claiming they want to \'help get your money back.\' What they really want to do is make unauthorized transfers. "What\'s more, they may ask for personal information like Social Security numbers, setting people up for possible identity theft." Fake gift card offers took second place, followed by phony package delivery problems. "Scammers understand how our shopping habits have changed and have updated their sleazy tactics accordingly," the FTC says. "People may get a text pretending to be from the U.S. Postal Service, FedEx, or UPS claiming there\'s a problem with a delivery. "The text links to a convincing-looking – but utterly bogus – website that asks for a credit card number to cover a small \'redelivery fee.\'" Scammers also target job seekers with bogus job offers in an attempt to steal their money and personal information. "With workplaces in transition, some scammers are using texts to perpetrate old-school forms of fraud – for example, fake \'mystery shopper\' jobs or bogus money-making offers for driving around with cars wrapped in ads," the report says. "Other texts target people who post their resumes on employment websites. They claim to offer jobs and even send job seekers checks, usually with instructions to send some of the money to a different address for materials, training, or the like. By the time the check bounces, the person\'s money – and the phony \'employer\' – are long gone." Finally, scammers impersonate Amazon and send fake security alerts to trick victims into sending money. "People may get what looks like a message from \'Amazon,\' asking to verify a big-ticket order they didn\'t place," the FTC says. "Concerned Ransomware Spam Malware Hack Tool Threat FedEx APT 28 APT 15 ChatGPT ChatGPT ★★
knowbe4.webp 2023-06-27 12:54:20 Le nouveau rapport de Singapore Cyber Landscape 2022 montre que les conflits de la Russie-Ukraine, les attaques de phishing et les attaques de ransomware augmentent, et bien plus encore
New Singapore Cyber Landscape 2022 Report Shows Russia-Ukraine Conflict, Phishing and Ransomware Attack Increases, and Much More
(lien direct)

New Singapore Cyber Landscape 2022 Report Shows Russia-Ukraine Conflict, Phishing and Ransomware Attack Increases, and Much More
Ransomware ★★★
knowbe4.webp 2023-06-24 14:43:00 Solarwinds \\ 'Head refuse de reculer au milieu d'une action réglementaire américaine potentielle sur le piratage russe
SolarWinds\\' Head Refuses to Back Down Amid Potential US Regulatory Action over Russian hack
(lien direct)

SolarWinds\' Head Refuses to Back Down Amid Potential US Regulatory Action over Russian hack
Hack ★★
knowbe4.webp 2023-06-23 15:35:38 La technique d'attaque de phishing «Image in Picture» est si simple, cela fonctionne
“Picture in Picture” Phishing Attack Technique Is So Simple, It Works
(lien direct)

“Picture in Picture” Phishing Attack Technique Is So Simple, It Works
★★★
knowbe4.webp 2023-06-23 15:35:18 La moitié des chefs d'entreprise croient que les utilisateurs ne sont pas conscients de la sécurité, malgré la plupart d'un programme en place
Half of Business Leaders Believe Users Aren\\'t Security Aware, Despite Most Having a Program in Place
(lien direct)

Half of Business Leaders Believe Users Aren\'t Security Aware, Despite Most Having a Program in Place
★★
knowbe4.webp 2023-06-20 13:00:00 Cyberheistnews Vol 13 # 25 [empreintes digitales partout] Les informations d'identification volées sont la cause profonde n ° 1 des violations de données
CyberheistNews Vol 13 #25 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches
(lien direct)
CyberheistNews Vol 13 #25 CyberheistNews Vol 13 #25  |   June 20th, 2023 [Fingerprints All Over] Stolen Credentials Are the No. 1 Root Cause of Data Breaches Verizon\'s DBIR always has a lot of information to unpack, so I\'ll continue my review by covering how stolen credentials play a role in attacks. This year\'s Data Breach Investigations Report has nearly 1 million incidents in their data set, making it the most statistically relevant set of report data anywhere. So, what does the report say about the most common threat actions that are involved in data breaches? Overall, the use of stolen credentials is the overwhelming leader in data breaches, being involved in nearly 45% of breaches – this is more than double the second-place spot of "Other" (which includes a number of types of threat actions) and ransomware, which sits at around 20% of data breaches. According to Verizon, stolen credentials were the "most popular entry point for breaches." As an example, in Basic Web Application Attacks, the use of stolen credentials was involved in 86% of attacks. The prevalence of credential use should come as no surprise, given the number of attacks that have focused on harvesting online credentials to provide access to both cloud platforms and on-premises networks alike. And it\'s the social engineering attacks (whether via phish, vish, SMiSh, or web) where these credentials are compromised - something that can be significantly diminished by engaging users in security awareness training to familiarize them with common techniques and examples of attacks, so when they come across an attack set on stealing credentials, the user avoids becoming a victim. Blog post with links:https://blog.knowbe4.com/stolen-credentials-top-breach-threat [New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist Now there\'s a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform! The new PhishER Blocklist feature lets you use reported messages to prevent future malicious email with the same sender, URL or attachment from reaching other users. Now you can create a unique list of blocklist entries and dramatically improve your Microsoft 365 email filters without ever l Ransomware Data Breach Spam Malware Hack Vulnerability Threat Cloud ChatGPT ChatGPT ★★
knowbe4.webp 2023-06-15 19:20:18 Déchange d'une attaque d'identité: utiliser des IPF et une personnalisation pour améliorer le succès de l'attaque
Breakdown of an Impersonation Attack: Using IPFS and Personalization to Improve Attack Success
(lien direct)

Breakdown of an Impersonation Attack: Using IPFS and Personalization to Improve Attack Success
★★
knowbe4.webp 2023-06-15 19:20:15 Un attaquant britannique responsable d'une attaque littérale «man-in-the-middle» est finalement traduit en justice
UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice
(lien direct)

UK Attacker Responsible for a Literal “Man-in-the-Middle” Ransomware Attack is Finally Brought to Justice
Ransomware ★★
knowbe4.webp 2023-06-13 13:56:50 85% des organisations ont connu au moins une attaque de ransomware au cours de la dernière année
85% of Organizations Have Experienced At Least One Ransomware Attack in the Last Year
(lien direct)

85% of Organizations Have Experienced At Least One Ransomware Attack in the Last Year
Ransomware ★★
knowbe4.webp 2023-06-13 13:56:46 Les cyberattaques basées sur l'État continuent d'être une épine du côté du cyber-assureur
State-Based Cyber Attacks Continue to Be a Thorn in the Cyber Insurer\\'s Side
(lien direct)

State-Based Cyber Attacks Continue to Be a Thorn in the Cyber Insurer\'s Side
★★
knowbe4.webp 2023-06-13 13:00:00 CyberheistNews Vol 13 # 24 [Le biais de l'esprit \\] le prétexage dépasse désormais le phishing dans les attaques d'ingénierie sociale
CyberheistNews Vol 13 #24 [The Mind\\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks
(lien direct)
CyberheistNews Vol 13 #24 CyberheistNews Vol 13 #24  |   June 13th, 2023 [The Mind\'s Bias] Pretexting Now Tops Phishing in Social Engineering Attacks The New Verizon DBIR is a treasure trove of data. As we will cover a bit below, Verizon reported that 74% of data breaches Involve the "Human Element," so people are one of the most common factors contributing to successful data breaches. Let\'s drill down a bit more in the social engineering section. They explained: "Now, who has received an email or a direct message on social media from a friend or family member who desperately needs money? Probably fewer of you. This is social engineering (pretexting specifically) and it takes more skill. "The most convincing social engineers can get into your head and convince you that someone you love is in danger. They use information they have learned about you and your loved ones to trick you into believing the message is truly from someone you know, and they use this invented scenario to play on your emotions and create a sense of urgency. The DBIR Figure 35 shows that Pretexting is now more prevalent than Phishing in Social Engineering incidents. However, when we look at confirmed breaches, Phishing is still on top." A social attack known as BEC, or business email compromise, can be quite intricate. In this type of attack, the perpetrator uses existing email communications and information to deceive the recipient into carrying out a seemingly ordinary task, like changing a vendor\'s bank account details. But what makes this attack dangerous is that the new bank account provided belongs to the attacker. As a result, any payments the recipient makes to that account will simply disappear. BEC Attacks Have Nearly Doubled It can be difficult to spot these attacks as the attackers do a lot of preparation beforehand. They may create a domain doppelganger that looks almost identical to the real one and modify the signature block to show their own number instead of the legitimate vendor. Attackers can make many subtle changes to trick their targets, especially if they are receiving many similar legitimate requests. This could be one reason why BEC attacks have nearly doubled across the DBIR entire incident dataset, as shown in Figure 36, and now make up over 50% of incidents in this category. Financially Motivated External Attackers Double Down on Social Engineering Timely detection and response is crucial when dealing with social engineering attacks, as well as most other attacks. Figure 38 shows a steady increase in the median cost of BECs since 2018, now averaging around $50,000, emphasizing the significance of quick detection. However, unlike the times we live in, this section isn\'t all doom and Spam Malware Vulnerability Threat Patching Uber APT 37 ChatGPT ChatGPT APT 43 ★★
knowbe4.webp 2023-06-12 13:18:26 La moitié des entreprises du Royaume-Uni ont été victimes de cyberattaques au cours des trois dernières années
Half of U.K. Companies Have Been a Cyber Attack Victim in the Last Three Years
(lien direct)

Half of U.K. Companies Have Been a Cyber Attack Victim in the Last Three Years
★★
knowbe4.webp 2023-06-12 13:18:07 Forrester: L'IA, le cloud computing et la géopolitique sont des cyber-états émergents en 2023
Forrester: AI, Cloud Computing, and Geopolitics are Emerging Cyberthreats in 2023
(lien direct)

Forrester: AI, Cloud Computing, and Geopolitics are Emerging Cyberthreats in 2023
Cloud ★★
Last update at: 2024-05-09 06:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter