What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2024-01-31 23:32:00 Kasperskys ics Cert
Kasperskys ICS CERT Predictions for 2024: Ransomware Rampage, Cosmopolitical Hacktivism, and Beyond
(lien direct)
Ransomware Studies Industrial ★★★★
globalsecuritymag.webp 2024-01-30 13:47:04 (Déjà vu) La recherche de la délibération révèle que les ransomwares sont de retour en augmentation alors que les cybercriminels \\ 'la motivation se déplace vers l'exfiltration des données
Delinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals\\' Motivation Shifts to Data Exfiltration
(lien direct)
La recherche sur la conduite révèle que les ransomwares sont de retour en augmentation alors que les cybercriminels \\ 'se déplacent vers l'exfiltration des données Plus de 75% des organisations paient des ransomwares à mesure que les entreprises de taille moyenne deviennent la cible préférée, le cloud devient le vecteur d'attaque le plus vulnérable - mise à jour malveillant
Delinea Research Reveals that Ransomware is Back on the Rise as Cybercriminals\' Motivation Shifts to Data Exfiltration More than 75% of organizations are paying ransomware as mid-sized companies become the preferred target, cloud becomes the most vulnerable attack vector - Malware Update
Ransomware Studies Cloud
globalsecuritymag.webp 2024-01-30 13:45:17 L\'étude Delinea révèle que les ransomwares sont de nouveau en hausse alors que les cybercriminels se tournent vers l\'exfiltration de données (lien direct) L'étude Delinea révèle que les ransomwares sont de nouveau en hausse alors que les cybercriminels se tournent vers l'exfiltration de données • Plus de 75 % des entreprises paient des ransomwares • Les entreprises de taille moyenne deviennent la cible privilégiée • L'informatique dématérialisée est le vecteur d'attaque le plus vulnérable - Malwares Ransomware Studies ★★★
IndustrialCyber.webp 2024-01-30 09:57:45 L'industrie aéronautique fait face à l'augmentation des risques de cybersécurité à mesure que les nouvelles technologies stimulent l'adoption, explique Aviation ISAC Survey
Aviation industry faces rising cybersecurity risks as new technologies drive adoption, says Aviation ISAC survey
(lien direct)
L'édition 2024 de l'Aviation ISAC Cyber Risk Survey a mis en évidence une croissance significative en 2023 avec l'adoption ...
The 2024 edition of the Aviation ISAC Cyber Risk Survey highlighted significant growth in 2023 with the adoption...
Studies Industrial ★★★
AlienVault.webp 2024-01-29 11:00:00 Étude de cas: USM de Vertek \\ partout où MDR aide plus grand concessionnaire automobile dans le nord-est à améliorer leur posture de cybersécurité
Case study: Vertek\\'s USM Anywhere MDR helps larger auto dealership in the northeast improve their Cybersecurity posture
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Challenges A larger auto dealership in the northeast faced a number of cybersecurity challenges, including: Lack of resources: The dealership did not have the in-house expertise or resources to manage its own security operations center (SOC).  The lack of trained security experts resulted in slower responses times to security incidents. Multiple security solutions: The dealership was using a variety of security solutions from different vendors, making it difficult to manage and correlate security data. Increased threat landscape: The dealership was facing an increasing number of cyber threats, including ransomware, phishing, and malware attacks. Solution The dealership engaged Vertek to implement their top of line Managed Detection and Response (MDR) service using AT&T AlienVault SIEM. Vertek\'s USM Anywhere MDR service provides 24/7 proactive threat monitoring, industry leading threat intelligence, and expert incident response. It is built on top of the AlienVault USM Anywhere platform, which is a unified security management (USM) platform that combines multiple essential security capabilities in one unified console.  The service easily integrates with the existing security stack and is implemented without interruption to existing operations. Benefits Since implementing Vertek\'s USM Anywhere MDR service the dealership has experienced a number of benefits, including: Improved security posture: Vertek\'s MDR service has helped the dealership improve its overall security posture by identifying and mitigating security vulnerabilities, and by providing the dealership with actionable security insights.  Vertek’s 24/7 SOC identifies and responds to security incidents with speed and accuracy using industry leading threat intelligence. Reduced workload and more effective allocation of resources: Vertek\'s MDR service has reduced the workload on the dealership\'s IT staff by freeing them up to focus on mission critical tasks that fall in line with their core competency.  Working with Vertek instead of building an in-house security team has resulted in significant cost savings for the dealership. Improved peace of mind: Vertek\'s MDR service gives the dealership peace of mind knowing that their security is being monitored and managed by a team of experts with expert response to threats. Specific example Vertek was actively monitoring a customer\'s network for threats using their USM Anywhere MDR service. AlienVault SIEM detected a large number of failed login attempts to the customer\'s Active Directory server. Vertek\'s security team immediately investigated the incident and discovered that the attacker was using a brute-force attack to try to guess the passwords of Active Directory users. Vertek\'s security team used context data in the form of network traffic, end-user behavior analytics, and NXLOGS output from their IT tools to understand the significance of the attack. They knew that the Active Directory server was a critical system for the customer, and that if the attacker was able to gain access to the server, they would be able to compromise the entire network. Vertek also used threat intelligence from the MITRE ATT&CK Framework to understand the tactics, techniques, and procedures (TTPs) of the attacker. They knew that brute-force attacks were a common tactic used by ransomware gangs. Based on the context data and threat intelligence, Vertek was able to determine that the customer was facing a high-risk ransomware attack. Vertek\'s security team quickly took steps to mitiga Ransomware Malware Tool Vulnerability Threat Studies ★★★
DarkReading.webp 2024-01-25 19:00:00 (Déjà vu) Panorays Study révèle que 94% des CISO se préoccupent des cyber-menaces tierces, mais seulement 3% ont mis en œuvre des mesures de sécurité
Panorays Study Finds 94% of CISOs Are Concerned About Third-party Cyber Threats, Yet Only 3% Have Implemented Security Measures
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Challenges A larger auto dealership in the northeast faced a number of cybersecurity challenges, including: Lack of resources: The dealership did not have the in-house expertise or resources to manage its own security operations center (SOC).  The lack of trained security experts resulted in slower responses times to security incidents. Multiple security solutions: The dealership was using a variety of security solutions from different vendors, making it difficult to manage and correlate security data. Increased threat landscape: The dealership was facing an increasing number of cyber threats, including ransomware, phishing, and malware attacks. Solution The dealership engaged Vertek to implement their top of line Managed Detection and Response (MDR) service using AT&T AlienVault SIEM. Vertek\'s USM Anywhere MDR service provides 24/7 proactive threat monitoring, industry leading threat intelligence, and expert incident response. It is built on top of the AlienVault USM Anywhere platform, which is a unified security management (USM) platform that combines multiple essential security capabilities in one unified console.  The service easily integrates with the existing security stack and is implemented without interruption to existing operations. Benefits Since implementing Vertek\'s USM Anywhere MDR service the dealership has experienced a number of benefits, including: Improved security posture: Vertek\'s MDR service has helped the dealership improve its overall security posture by identifying and mitigating security vulnerabilities, and by providing the dealership with actionable security insights.  Vertek’s 24/7 SOC identifies and responds to security incidents with speed and accuracy using industry leading threat intelligence. Reduced workload and more effective allocation of resources: Vertek\'s MDR service has reduced the workload on the dealership\'s IT staff by freeing them up to focus on mission critical tasks that fall in line with their core competency.  Working with Vertek instead of building an in-house security team has resulted in significant cost savings for the dealership. Improved peace of mind: Vertek\'s MDR service gives the dealership peace of mind knowing that their security is being monitored and managed by a team of experts with expert response to threats. Specific example Vertek was actively monitoring a customer\'s network for threats using their USM Anywhere MDR service. AlienVault SIEM detected a large number of failed login attempts to the customer\'s Active Directory server. Vertek\'s security team immediately investigated the incident and discovered that the attacker was using a brute-force attack to try to guess the passwords of Active Directory users. Vertek\'s security team used context data in the form of network traffic, end-user behavior analytics, and NXLOGS output from their IT tools to understand the significance of the attack. They knew that the Active Directory server was a critical system for the customer, and that if the attacker was able to gain access to the server, they would be able to compromise the entire network. Vertek also used threat intelligence from the MITRE ATT&CK Framework to understand the tactics, techniques, and procedures (TTPs) of the attacker. They knew that brute-force attacks were a common tactic used by ransomware gangs. Based on the context data and threat intelligence, Vertek was able to determine that the customer was facing a high-risk ransomware attack. Vertek\'s security team quickly took steps to mitiga Studies
RecordedFuture.webp 2024-01-25 18:19:47 Un nouveau projet de loi cherche à consolider la nourriture américaine, les secteurs de l'agriculture
New bill looks to shore up US food, agriculture sectors
(lien direct)
Un duo bipartite des sénateurs américains a présenté jeudi une législation pour stimuler les défenses numériques protégeant les secteurs de l'agriculture et des infrastructures critiques. The Farm and Food Cybersecurity Act De Sens. Kirsten Gillibrand (D-ny) et Tom et Tom et TomLe coton (R-AR) obligerait le secrétaire à l'Agriculture à mener une étude tous les deux ans sur les cyber-menaces
A bipartisan duo of U.S. senators on Thursday introduced legislation to boost the digital defenses protecting the agriculture and food critical infrastructure sectors. The Farm and Food Cybersecurity Act from Sens. Kirsten Gillibrand (D-NY) and Tom Cotton (R-AR) would require the Secretary of Agriculture to conduct a study every two years on the cyber threats
Studies Legislation ★★★
globalsecuritymag.webp 2024-01-25 17:38:02 Panorays Study révèle que 94% des CISO se préoccupent des cyber-menaces tierces, mais seulement 3% ont mis en œuvre des mesures de sécurité
Panorays Study Finds 94% of CISOs are Concerned About Third-party Cyber Threats, Yet Only 3% Have Implemented Security Measures
(lien direct)
L'étude Panorays révèle que 94% des CISO se préoccupent des cyber-menaces tierces, mais seulement 3% ont mis en œuvre des mesures de sécurité - rapports spéciaux
Panorays Study Finds 94% of CISOs are Concerned About Third-party Cyber Threats, Yet Only 3% Have Implemented Security Measures - Special Reports
Studies ★★★
InfoSecurityMag.webp 2024-01-25 13:00:00 Semaine de confidentialité des données: les violations des données américaines surfance, 2023 voit une augmentation de 78% des compromis
Data Privacy Week: US Data Breaches Surge, 2023 Sees 78% Increase in Compromises
(lien direct)
Plus de 350 millions de personnes ont été touchées par les violations de données aux États-Unis en 2023 et 11% de toutes les sociétés cotées en bourse ont été compromises
Over 350 million individuals were impacted by data breaches in the US in 2023 and 11% of all publicly traded companies have been compromised
Studies ★★★★
IndustrialCyber.webp 2024-01-25 09:09:47 Une nouvelle étude Concordia montre que les parcs éoliens offshore sont vulnérables aux cyberattaques
New Concordia study shows offshore wind farms are vulnerable to cyberattacks
(lien direct)
> Selon une étude récente menée par Concordia, les parcs éoliens offshore sont sensibles aux cyberattaques.L'étude met en évidence ...
>According to a recent study conducted by Concordia, offshore wind farms are susceptible to cyberattacks. The study highlights...
Studies Studies ★★★★
IndustrialCyber.webp 2024-01-25 09:06:52 La recherche de ForeScout révèle une augmentation alarmante des cyberattaques, souligne le besoin d'une meilleure cybersécurité des infrastructures critiques
Forescout Research reveals alarming rise in cyberattacks, emphasizes need for better critical infrastructure cybersecurity
(lien direct)
Données publiées par ForeScout Research & # 8211;Vedere Labs révèle qu'il y a eu plus de 420 millions d'attaques enregistrées tout au long ...
Data published by Forescout Research – Vedere Labs reveals that there were over 420 million recorded attacks throughout...
Studies ★★★
TechRepublic.webp 2024-01-24 20:38:38 Étude du National Cyber Security Center: L'IA générative peut augmenter la menace mondiale des ransomwares
National Cyber Security Centre Study: Generative AI May Increase Global Ransomware Threat
(lien direct)
Voir les prédictions de NCSC \\ pour l'IA générative pour la cyberattaque et la défense jusqu'en 2025.
See NCSC\'s predictions for generative AI for cyber attack and defense through 2025.
Ransomware Threat Studies ★★★
IndustrialCyber.webp 2024-01-24 13:03:55 Armis: les tentatives d'attaque de cybersécurité doublent en 2023, besoin urgent de hiérartisation et d'atténuation des risques en 2024
Armis: Cybersecurity attack attempts double in 2023, urgent need for prioritization and risk mitigation in 2024
(lien direct)
> La société de cybersécurité des renseignements d'actifs Armis a révélé que les attaques de cybersécurité tentent plus que doublé, augmentant 104% en 2023 ....
>Asset intelligence cybersecurity company Armis disclosed that cybersecurity attack attempts more than doubled, increasing 104 percent in 2023....
Studies Industrial ★★★
The_Hackers_News.webp 2024-01-22 16:52:00 52% des vulnérabilités graves que nous trouvons sont liées à Windows 10
52% of Serious Vulnerabilities We Find are Related to Windows 10
(lien direct)
Nous avons analysé 2,5 millions de vulnérabilités que nous avons découvertes dans les actifs de nos clients.C'est ce que nous avons trouvé. Creuser dans les données L'ensemble de données que nous analysons ici est représentatif d'un sous-ensemble de clients qui souscrivent à nos services de numérisation de vulnérabilité.Les actifs numérisés incluent ceux accessibles sur Internet, ainsi que ceux présents sur les réseaux internes.Les données incluent les résultats du réseau
We analyzed 2,5 million vulnerabilities we discovered in our customer\'s assets. This is what we found. Digging into the data The dataset we analyze here is representative of a subset of clients that subscribe to our vulnerability scanning services. Assets scanned include those reachable across the Internet, as well as those present on internal networks. The data includes findings for network
Vulnerability Studies ★★★★
globalsecuritymag.webp 2024-01-22 14:42:50 Les tentatives de cyberattaques ont plus que doublé en 2023, augmentant de 104 % (lien direct) Les tentatives de cyberattaques ont plus que doublé en 2023, augmentant de 104 % Le système d'analyse de données exclusif d'Armis offre un plan d'action possible quant aux domaines à prioriser pour l'année à venir - Investigations Studies ★★★★
RecordedFuture.webp 2024-01-17 13:08:00 L'Estonie arrête le professeur russe soupçonné d'espionnage
Estonia arrests Russian professor on suspicion of espionage
(lien direct)
Un professeur d'université a été arrêté en Estonie soupçonné d'avoir facilité et conduit une activité de renseignement ciblant le pays.Viacheslav Morozov, 51 ans, était professeur de théorie internationale à l'Université de Tartu avant l'arrestation a conduit son emploi à être terminé , selon Kristiina T & Otilde; Nisson, le chef de l'Institut d'études politiques de l'Université.Le
A university professor has been arrested in Estonia on suspicion of facilitating and conducting intelligence activity targeting the country. Viacheslav Morozov, 51, was a professor of international theory at the University of Tartu before the arrest led to his employment being terminated, according to Kristiina Tõnisson, the head of the university\'s political studies institute. The
Studies ★★★
Chercheur.webp 2024-01-17 12:14:03 Le code écrit avec des assistants d'IA est moins sécurisé
Code Written with AI Assistants Is Less Secure
(lien direct)
Recherche intéressante: & # 8220; Les utilisateurs écrivent-ils un code plus peu sûr avec des assistants d'IA? & # 8220 ;: Résumé: Nous effectuons la première étude utilisateur à grande échelle en examinant comment les utilisateurs interagissent avec un assistant de code AI pour résoudre une variété de tâches liées à la sécurité dans différents langages de programmation.Dans l'ensemble, nous constatons que les participants qui avaient accès à un assistant d'IA basé sur le modèle Codex-Davinci-002 d'Openai ont écrit du code nettement moins sécurisé que ceux sans accès.De plus, les participants ayant accès à un assistant d'IA étaient plus susceptibles de croire qu'ils ont écrit du code sécurisé que ceux sans accès à l'assistant d'IA.En outre, nous constatons que les participants qui ont fait confiance à l'IA moins et se sont engagés davantage dans le langage et le format de leurs invites (par exemple, le réhabrasage, l'ajustement de la température) a fourni du code avec moins de vulnérabilités de sécurité.Enfin, afin de mieux informer la conception des futurs assistants de code basés sur l'IA, nous fournissons une analyse approfondie des participants & # 8217;Comportement du langage et d'interaction, ainsi que la publication de notre interface utilisateur comme instrument pour mener des études similaires à l'avenir ...
Interesting research: “Do Users Write More Insecure Code with AI Assistants?“: Abstract: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. Overall, we find that participants who had access to an AI assistant based on OpenAI’s codex-davinci-002 model wrote significantly less secure code than those without access. Additionally, participants with access to an AI assistant were more likely to believe they wrote secure code than those without access to the AI assistant. Furthermore, we find that participants who trusted the AI less and engaged more with the language and format of their prompts (e.g. re-phrasing, adjusting temperature) provided code with fewer security vulnerabilities. Finally, in order to better inform the design of future AI-based Code assistants, we provide an in-depth analysis of participants’ language and interaction behavior, as well as release our user interface as an instrument to conduct similar studies in the future...
Vulnerability Studies ★★★★
The_Hackers_News.webp 2024-01-16 16:19:00 Étude de cas: le monstre de confidentialité des cookies dans le grand commerce mondial
Case Study: The Cookie Privacy Monster in Big Global Retail
(lien direct)
Explorez comment une solution avancée de gestion de l'exposition a permis à un grand client de l'industrie du commerce de détail de se terminer sur le pas coquin en raison d'une erreur de configuration dans sa politique de gestion des cookies.Ce n'était rien de malveillant, mais les environnements Web modernes étant si complexes, des erreurs peuvent se produire et les amendes de non-conformité peuvent être à une surveillance. Téléchargez l'étude de cas complète et NBSP; ici. Enfant,
Explore how an advanced exposure management solution saved a major retail industry client from ending up on the naughty step due to a misconfiguration in its cookie management policy. This wasn\'t anything malicious, but with modern web environments being so complex, mistakes can happen, and non-compliance fines can be just an oversight away.Download the full case study here. As a child,
Studies ★★★
Checkpoint.webp 2024-01-16 14:10:51 Recherche de point de contrôle: 2023 & # 8211;L'année des méga attaques de ransomwares avec un impact sans précédent sur les organisations mondiales
Check Point Research: 2023 – The year of Mega Ransomware attacks with unprecedented impact on global organizations
(lien direct)
> Un stupéfiant 1 organisation sur 10 dans le monde a frappé par de tentatives d'attaques de ransomwares en 2023, augmentant 33% par rapport à l'année précédente, lorsque 1 organisation sur 13 a reçu des attaques de ransomware tout au long de 2023, les organisations du mondeMoyenne, 1158 attaques par organisation par semaine des secteurs de vente au détail / gros ont été témoins d'un pic notable de 22% dans les attaques chaque semaine, par rapport aux tendances mondiales de 2022 dans les cyberattaques.à l'échelle mondiale.Vérifier l'analyse complète des données des données de cyber-attaques, y compris les statistiques pour tous [& # 8230;]
>A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each experienced over 60,000 attacks on average, 1158 attacks per organization per week Retail/Wholesale sectors witnessed a notable 22% spike in attacks weekly, compared to 2022 Global Trends in Cyberattacks The digital realm continues to be a battleground for cyber security, with 2023 marking another year of relentless cyber attacks globally. Check Point Research’s comprehensive analysis of cyber attack data, including statistics for all […]
Ransomware Studies ★★★★
InfoSecurityMag.webp 2024-01-16 13:45:00 Courriel Nightmare: 94% des entreprises frappées par des attaques de phishing en 2023
Email Nightmare: 94% of Firms Hit by Phishing Attacks in 2023
(lien direct)
Dans son dernier rapport sur les risques de sécurité par e-mail, Egress a constaté que les entreprises étaient 10% plus affectées négativement par les attaques de phishing en 2023 qu'en 2022
In its latest Email Security Risk Report, Egress found that businesses were 10% more negatively affected by phishing attacks in 2023 than in 2022
Studies ★★★
globalsecuritymag.webp 2024-01-16 08:09:50 Les incidents cyber, en tête du Baromètre des risques d\'Allianz 2024 (lien direct) Les incidents cyber, en tête du Baromètre des risques d'Allianz 2024 Les violations de données, les attaques contre les infrastructures essentielles ou les biens physiques et les attaques par ransomware, de plus en plus fréquentes, sont les risques cyber les plus préoccupants. L'interruption d'activité demeure à la 2e place, avec 31 % des réponses. Les catastrophes naturelles réalisent la plus forte hausse par rapport à 2023, avec 26 %, et se classent en 3e place. En France, les incidents cyber (44%) et les interruptions d'activité (40%) sont également en tête du classement, suivis par les risques d'incendie et explosion qui grimpent à la 3e place (25%). Le baromètre des risques Allianz explore également les risques de 23 secteurs clés : Transport & logistique (1e Évolutions législatives et réglementaires), Marine & transport maritime (1e ex aequo Incendie, explosion et Vol, fraude et corruption), Aviation (1e Risques politiques), Télécoms (1e Incidents cyber), Ingénierie, construction & immobilier (1e Catastrophes naturelles), Agriculture (1e Changement climatique) ... - Investigations Ransomware Studies Prediction ★★★
IndustrialCyber.webp 2024-01-12 11:59:43 Le rapport du CCB met en évidence le paysage cyber-menace en 2023, alors que les attaques hacktiviste et parrainée par l'État augmentent
CCB report highlights cyber threat landscape in 2023, as hacktivist and state-sponsored attacks rise
(lien direct)
Le Center for Cybersecurity Belgium (CCB) a révélé que le paysage mondial de la cyber-menace en 2023 continuait d'être ...
The Centre for Cybersecurity Belgium (CCB) disclosed that the global cyber threat landscape in 2023 continued to be...
Threat Studies ★★★
globalsecuritymag.webp 2024-01-11 15:24:12 SecurityScoreCard Research: Volt Typhoon compromet 30% des appareils Cisco RV320 / 325 en 37 jours
SecurityScorecard Threat Research: Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
(lien direct)
Recherche de menace de sécurité de sécurité: Volt Typhoon compromet 30% des appareils Cisco RV320 / 325 en 37 jours - mise à jour malveillant
SecurityScorecard Threat Research: Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days - Malware Update
Vulnerability Threat Studies Guam ★★★★
globalsecuritymag.webp 2024-01-11 09:27:04 Étude Netskope Threat Labs : les cybercriminels surfent sur l\'augmentation de 400 % de l\'utilisation d\'applications d\'IA générative par les employés (lien direct) Étude Netskope Threat Labs : les cybercriminels surfent sur l'augmentation de 400 % de l'utilisation d'applications d'IA générative par les employés Une nouvelle étude détaille la forte croissance de l'adoption de l'intelligence artificielle générative, les risques liés aux applications en cloud, les principales menaces et les adversaires tout au long de l'année 2023. - Investigations Threat Studies Cloud ★★★★
globalsecuritymag.webp 2024-01-10 15:54:40 En 2023, plus de la moitié des entreprises ont subi une cyberattaque ou ont été touchées par un incident entraînant une interruption d\'accès à leurs données (lien direct) En 2023, plus de la moitié des entreprises ont subi une cyberattaque ou ont été touchées par un incident entraînant une interruption d'accès à leurs données • En moyenne, les perturbations informatiques ont engendré des coûts s'élevant à 2,61 millions de dollars par entreprise • 88 % des interrogés reconnaissent que l'IA générative génère des quantités significatives de nouvelles données à protéger • Seuls 28 % des entreprises victimes d'une attaque auraient été entièrement remboursées par leur assurance - Investigations Studies ★★★★
globalsecuritymag.webp 2024-01-10 15:40:49 Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023 (lien direct) Microsoft revient à la première place en tant que marque la plus imitée dans les attaques de phishing pour le quatrième trimestre 2023 Le dernier rapport de phishing de marque de Check Point Research considère Microsoft comme la marque numéro un imite par les cybercriminels avec le secteur de la technologie dominant les dix premiers - mise à jour malveillant / /
Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023 The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten - Malware Update /
Studies ★★★
globalsecuritymag.webp 2024-01-09 19:28:27 21 % des cyberincidents survenus dans les entreprises en France au cours des deux dernières années ont été provoqués par des employés (lien direct) 21 % des cyberincidents survenus dans les entreprises en France au cours des deux dernières années ont été provoqués par des employés selon une récente étude menée par Kaspersky - Investigations Studies ★★★
globalsecuritymag.webp 2024-01-09 14:41:02 85 % des plus grandes entreprises de télécommunications ont subi une violation de données de tiers au cours des 12 derniers mois (lien direct) Un nouveau rapport de SecurityScorecard montre que pas moins de 85 % des plus grandes entreprises de télécommunications aux États-Unis, au Royaume-Uni, en France, en Italie, au Danemark et en Allemagne ont été victimes d'une violation de données par des tiers au cours des 12 derniers mois seulement. - Investigations Studies ★★
ProofPoint.webp 2024-01-09 11:57:12 L'augmentation préoccupante des attaques centrées sur l'identité: tendances et faits
The Concerning Rise in Identity-Centric Attacks: Trends and Facts
(lien direct)
Identity threats are by no means a new type of crime. But in today\'s increasingly digitized world, there are more opportunities for bad actors to steal identities and engage in identity-centric attacks than ever before. Unfortunately, user identities are tough for businesses to protect. The fact that these types of attacks are skyrocketing is evidence of that-in the past year alone the Identity Defined Security Alliance reports that a whopping 84% of companies experienced an identity-related security breach.  In this post, we\'ll take a look at identity attack statistics and trends and provide some recent case studies to illustrate how some attacks work. We\'ll also highlight one of the most important identity threat facts-that the human element plays a crucial role in the success of these attacks.   Understanding identity-centric attacks  There are many types of identity attacks. When most people think of these types of crimes, they often imagine traditional identity theft scenarios:  Financial identity theft, where a criminal gains access to a victim\'s financial data, like their credit card details, bank account numbers or Social Security number, to make unauthorized purchases, withdraw funds or open new accounts.   Tax identity theft, where a bad actor uses a victim\'s personal information to file false tax returns and claim refunds, diverting the money to their own accounts.  Employment identity theft, where a fraudster uses a victim\'s identity to get a job, potentially causing issues for that person when discrepancies arise in their employment and tax records.  But identity-based attacks also target enterprises and their online users. The cybercriminals behind these attacks might aim to steal sensitive data, siphon off funds, damage or disrupt systems, deploy ransomware or worse. Those are the types of identity attacks we\'re covering here.  Identity threat trends and tactics  In short, identity-centric attacks are a practical calculation by bad actors: Why would they invest their time and resources to build exploits to help them get in through a virtual back door when they can just walk through the front door?  But before they reap the rewards, they still have some legwork to do. Here are a few techniques that cybercriminals use to progress identity-based attacks against businesses and their users:  MFA bypass attacks. Many businesses today use multifactor authentication (MFA) to protect the account of their users. It\'s more secure than using passwords alone. But of course, bad actors have found new ways to bypass commonly used MFA methods. MFA fatigue attacks are one example.   People-activated malware. People often give life to malware when they fall for a phishing scam or other social engineering tactics. Malware can appear in the form of a .zip file, QR code, .html link, MS Office file and more-there are at least 60 known techniques to plant people-activated malware on corporate networks.  Active Directory (AD) attacks. Most enterprises today use AD as a primary method for directory services like user authentication and authorization. Cybercriminals are keen to target AD, which touches almost every place, person and device on a network. This approach works very well, too-more than half of identity-related breaches can be traced back to AD.  Cached credentials harvesting. Cached credentials are commonly stored on endpoints, in memory, in the registry, in a browser or on disk. Attackers use various tools and techniques to collect these credentials and gain access to more privileged identities. Once they have harvested these credentials, they can use them to move laterally and log into different applications.   Adversaries are likely to find a good “crop” when they are harvesting cached credentials. Recent research from Proofpoint found that more than one in 10 endpoints have exposed privileged account passwords, making it one of the most common identity risks.  Keep in mind that cybercriminals are always innovating, and they are quick to build or adopt tools that Ransomware Malware Tool Threat Studies Uber ★★
ComputerWeekly.webp 2024-01-09 09:45:00 L'étude révèle les cyber-risques aux élections américaines
Study reveals cyber risks to US elections
(lien direct)
Identity threats are by no means a new type of crime. But in today\'s increasingly digitized world, there are more opportunities for bad actors to steal identities and engage in identity-centric attacks than ever before. Unfortunately, user identities are tough for businesses to protect. The fact that these types of attacks are skyrocketing is evidence of that-in the past year alone the Identity Defined Security Alliance reports that a whopping 84% of companies experienced an identity-related security breach.  In this post, we\'ll take a look at identity attack statistics and trends and provide some recent case studies to illustrate how some attacks work. We\'ll also highlight one of the most important identity threat facts-that the human element plays a crucial role in the success of these attacks.   Understanding identity-centric attacks  There are many types of identity attacks. When most people think of these types of crimes, they often imagine traditional identity theft scenarios:  Financial identity theft, where a criminal gains access to a victim\'s financial data, like their credit card details, bank account numbers or Social Security number, to make unauthorized purchases, withdraw funds or open new accounts.   Tax identity theft, where a bad actor uses a victim\'s personal information to file false tax returns and claim refunds, diverting the money to their own accounts.  Employment identity theft, where a fraudster uses a victim\'s identity to get a job, potentially causing issues for that person when discrepancies arise in their employment and tax records.  But identity-based attacks also target enterprises and their online users. The cybercriminals behind these attacks might aim to steal sensitive data, siphon off funds, damage or disrupt systems, deploy ransomware or worse. Those are the types of identity attacks we\'re covering here.  Identity threat trends and tactics  In short, identity-centric attacks are a practical calculation by bad actors: Why would they invest their time and resources to build exploits to help them get in through a virtual back door when they can just walk through the front door?  But before they reap the rewards, they still have some legwork to do. Here are a few techniques that cybercriminals use to progress identity-based attacks against businesses and their users:  MFA bypass attacks. Many businesses today use multifactor authentication (MFA) to protect the account of their users. It\'s more secure than using passwords alone. But of course, bad actors have found new ways to bypass commonly used MFA methods. MFA fatigue attacks are one example.   People-activated malware. People often give life to malware when they fall for a phishing scam or other social engineering tactics. Malware can appear in the form of a .zip file, QR code, .html link, MS Office file and more-there are at least 60 known techniques to plant people-activated malware on corporate networks.  Active Directory (AD) attacks. Most enterprises today use AD as a primary method for directory services like user authentication and authorization. Cybercriminals are keen to target AD, which touches almost every place, person and device on a network. This approach works very well, too-more than half of identity-related breaches can be traced back to AD.  Cached credentials harvesting. Cached credentials are commonly stored on endpoints, in memory, in the registry, in a browser or on disk. Attackers use various tools and techniques to collect these credentials and gain access to more privileged identities. Once they have harvested these credentials, they can use them to move laterally and log into different applications.   Adversaries are likely to find a good “crop” when they are harvesting cached credentials. Recent research from Proofpoint found that more than one in 10 endpoints have exposed privileged account passwords, making it one of the most common identity risks.  Keep in mind that cybercriminals are always innovating, and they are quick to build or adopt tools that Studies ★★
globalsecuritymag.webp 2024-01-09 08:06:10 Adapter ou périr: 60% des membres du conseil d'administration n'ont pas reçu une formation en cyber-résilience suffisante au cours de la dernière année
Adapt or Perish: 60% of board members have not received sufficient cyber resilience training in the past year
(lien direct)
Adapter ou périr: 60% des membres du conseil d'administration n'ont pas reçu suffisamment de formation en cyber-résilience au cours de la dernière année par Bob Semple, le renseignement du conseil d'administration et l'Institut de gouvernance d'entreprise - rapports spéciaux
Adapt or Perish: 60% of board members have not received sufficient cyber resilience training in the past year by Bob Semple, Board Intelligence and The Corporate Governance Institute - Special Reports
Studies ★★
CS.webp 2024-01-08 22:00:59 Problèmes séculaires au partage d'informations sur la cyber-menace demeure,
Age-old problems to sharing cyber threat info remain, IG report finds
(lien direct)
> Sur-classification, un déluge de données et des ressources humaines et technologiques insuffisantes entravent toutes le partage des données de menace.
>Over-classification, a deluge of data and insufficient human and technological resources all hinder the sharing of threat data.
Threat Studies ★★★
silicon.fr.webp 2024-01-08 17:18:25 Transparence des LLM : ce qui coince chez OpenAI & Cie (lien direct) Il y a quelques semaines, Stanford publiait son " index de transparence des modèles de fondation ". Retour sur les points faibles qui en ressortent. Studies ★★★★
Blog.webp 2024-01-08 13:22:44 Données empoisonnées, manipulation malveillante: l'étude NIST révèle des vulnérabilités de l'IA
Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities
(lien direct)
> Par waqas NIST dévoile les informations sur les vulnérabilités de l'IA et les menaces potentielles. Ceci est un article de HackRead.com Lire le post original: Données empoisonnées, manipulation malveillante: l'étude NIST révèle des vulnérabilités de l'IA
>By Waqas NIST Unveils Insights on AI Vulnerabilities and Potential Threats.w This is a post from HackRead.com Read the original post: Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities
Vulnerability Studies ★★
InfoSecurityMag.webp 2024-01-08 11:00:00 Les pirates nord-coréens ont volé 600 millions de dollars en crypto en 2023
North Korean Hackers Stole $600m in Crypto in 2023
(lien direct)
Les pirates nord-coréens restent efficaces pour voler la crypto-monnaie malgré la croissance de l'action internationale de l'application des lois
North Korean hackers remain effective in stealing cryptocurrency despite growing international law enforcement action
Studies ★★★★
The_Hackers_News.webp 2024-01-08 10:29:00 Le cyber-braquage de la Corée du Nord: les pirates de RPDC ont volé 600 millions de dollars en crypto-monnaie en 2023
North Korea\\'s Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023
(lien direct)
Les acteurs de la menace affiliés à la République de Corée du peuple démocrate (également connu sous le nom de Corée du Nord) ont pillé au moins 600 millions de dollars en crypto-monnaie en 2023. La RPDC "était responsable de près d'un tiers de tous les fonds volés dans des attaques cryptographiques l'année dernière, malgré une réduction de 30% par rapport au transport de 850 millions USD en 2022", la société d'analyse de la blockchain Trm Labs & NBSP; a déclaré & nbsp; la semaine dernière. "Hacks
Threat actors affiliated with the Democratic People\'s Republic of Korea (also known as North Korea) have plundered at least $600 million in cryptocurrency in 2023. The DPRK "was responsible for almost a third of all funds stolen in crypto attacks last year, despite a 30% reduction from the USD 850 million haul in 2022," blockchain analytics firm TRM Labs said last week. "Hacks
Threat Studies ★★
Blog.webp 2024-01-05 17:52:17 Signal, IA Généré de l'art, Amazon, Facebook les plus invasives Applications, étudient
Signal, AI Generated Art Least, Amazon, Facebook Most Invasive Apps, Study
(lien direct)
> Par waqas L'analyse approfondie révèle les modèles dans la collecte des données des utilisateurs, avec des applications de shopping et de livraison de nourriture à l'avant. Ceci est un article de HackRead.com Lire le post original: Signal, AI Généré de l'art, Amazon, Facebook les plus invasives Applications, Study
>By Waqas In-depth analysis reveals concerning patterns in user data collection, with shopping and food delivery apps at the forefront. This is a post from HackRead.com Read the original post: Signal, AI Generated Art Least, Amazon, Facebook Most Invasive Apps, Study
Studies ★★★
ProofPoint.webp 2024-01-05 06:00:31 2023 Année en revue: versions de contenu axées sur les menaces pour la sensibilisation à la sécurité
2023 Year in Review: Threat-Driven Content Releases for Security Awareness
(lien direct)
As a new year approaches, it is natural to reflect on recent accomplishments. At Proofpoint, we are reflecting on our work to deliver security awareness content and updated features in line with our ongoing goal to drive behavior change.   Proofpoint Security Awareness integrates our rich threat intelligence, which means it taps into current and emerging attacks. Our threat analysts surface threat trends, such as artificial intelligence (AI)-enhanced vishing, malicious QR codes and remote IT support scams. And then we work quickly to release new training features and awareness material to ensure inform security administrators and educate employees about ever-evolving attacks.  In 2023, our content releases focused on three areas:  Delivering a threat-driven program  Improving how security awareness administrators work   Enhancing how people learn  Let\'s review the past year and explore how Proofpoint used content releases to respond to the changing threat landscape.   Image from AI Chatbot Threats training (play video).  Quick turnaround for threat trends  Proofpoint Security Awareness alerts customers to threats in two powerful ways-Threat Alerts and Attack Spotlights. It also continuously trains employees with threat-driven training modules.   Threat Alerts   These weekly releases focus on a specific and current ongoing attack. They explain what the threat is and who it might target. And they describe a specific lure, if applicable.   Each alert is linked to activity that our threat analysts see happening in the wild. We recommend applicable training like simulated phishing and awareness material and include suggested email messaging.   In 2023, we released Threat Alerts on:  IRS-themed phishing lures for tax season (February, March, April)  AI-enhanced vishing calls that impersonate loved ones (March)   Malicious QR codes for credential phishing (May, August)  Telephone-oriented attack delivery (TOAD) using a Geek Squad PDF lure (July, October)   Charity donation scams around the Israel-Palestine crisis (October)  Christmas party lures for credential phishing (November)   Attack Spotlights   These monthly releases cast a wider lens on attack types. They focus on a time-based or reoccurring threat that is expected to trend, typically related to holidays, travel seasons or shopping events. Each spotlight is released a month in advance with a campaign plan, awareness material and training modules, and is available in 12 core languages.   In 2023, Proofpoint published these Attack Spotlight campaigns:  Smishing with package delivery lures (February)  Business email compromise (BEC) phishing with requests for quotations (RFQs) (April)   LinkedIn phishing lures (May)   Amazon phishing lures (June)  Remote IT support scams (September)  Gift card scams (December)  Image from Attack Spotlight video (play video).  Threat modules  These training videos are relevant to the changing threat landscape. They are inspired by our threat intelligence and our team\'s threat landscape research. These micro-learning modules are grounded in learning science principles that are designed to drive behavior change.   Each module has a concise and specific learning objective. The delivery of content is tailored to individual factors such as a person\'s role, learning style, vulnerability level and preferred language.   In 2023, we covered these topics in our new threat training modules:  Data loss protection   AI chatbot threats  Amazon phishing scams  Cryptocurrency investment scams   QR code dangers  Multifactor authentication (MFA)  Image from Threat Module video (play video).  Staying ahead of generative AI attacks  AI-powered systems are promoted as tools to help us work faster, and they are transforming businesses and industries. This wide-reaching access can create security risks from potential data breaches to concerns over user privacy. Your employees need to be aware of the limitations and risks of using AI-powered tools, especiall Ransomware Tool Vulnerability Threat Studies Prediction Cloud ★★★★
SonarSource.webp 2024-01-03 23:00:00 La recherche sur la vulnérabilité met en évidence 2023
Vulnerability Research Highlights 2023
(lien direct)
Notre équipe de recherche sur la vulnérabilité revient sur une grande année et résume les points forts de 2023.
Our Vulnerability Research team looks back at a great year and summarizes the highlights of 2023.
Vulnerability Studies ★★★
SecurityWeek.webp 2024-01-03 11:43:54 21 nouvelles familles de logiciels malveillants Mac ont émergé en 2023
21 New Mac Malware Families Emerged in 2023
(lien direct)
> Au total, 21 nouvelles familles de logiciels malveillants ciblant les systèmes MacOS ont été découvertes en 2023, soit une augmentation de 50% par rapport à 2022.
>A total of 21 new malware families targeting macOS systems were discovered in 2023, a 50% increase compared to 2022. 
Malware Studies ★★★★
globalsecuritymag.webp 2024-01-02 11:08:18 Etude Zscaler : 86 % des cyberattaques transitent par des canaux chiffrés, et l\'industrie manufacturière est la plus ciblée (lien direct) Etude Zscaler : 86 % des cyberattaques transitent par des canaux chiffrés, et l'industrie manufacturière est la plus ciblée Principaux constats : Les menaces via HTTPS sont en hausse de 24 % sur un an dans le cloud de Zscaler, soit près de 30 milliards de menaces bloquées. Les logiciels malveillants et les contenus malveillants chiffrés représentent une menace majeure, à l'origine de 78 % des attaques observées. L'industrie manufacturière a été le secteur le plus ciblé, et a subi 32 % des attaques chiffrées, alors que plus de 2,1 milliards de transactions liées à l'IA/au ML ont été traitées. Les exploits de navigateur et les sites de logiciels espions sont en hausse de 297 % et 290 % sur un an. - Investigations Threat Studies Cloud ★★★★
AlienVault.webp 2023-12-27 11:00:00 Cybersécurité post-pandémique: leçons de la crise mondiale de la santé
Post-pandemic Cybersecurity: Lessons from the global health crisis
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Beyond ‘just’ causing mayhem in the outside world, the pandemic also led to a serious and worrying rise in cybersecurity breaches. In 2020 and 2021, businesses saw a whopping 50% increase in the amount of attempted breaches. The transition to remote work, outdated healthcare organization technology, the adoption of AI bots in the workplace, and the presence of general uncertainty and fear led to new opportunities for bad actors seeking to exploit and benefit from this global health crisis. In this article, we will take a look at how all of this impacts the state of cybersecurity in the current post-pandemic era, and what conclusions can be drawn. New world, new vulnerabilities Worldwide lockdowns led to a rise in remote work opportunities, which was a necessary adjustment to allow employees to continue to earn a living. However, the sudden shift to the work-from-home format also caused a number of challenges and confusion for businesses and remote employees alike. The average person didn’t have the IT department a couple of feet away, so they were forced to fend for themselves. Whether it was deciding whether to use a VPN or not, was that email really a phishing one, or even just plain software updates, everybody had their hands full. With employers busy with training programs, threat actors began intensifying their ransomware-related efforts, resulting in a plethora of high-profile incidents in the last couple of years. A double-edged digital sword If the pandemic did one thing, it’s making us more reliant on both software and digital currencies. You already know where we’re going with this—it’s fertile ground for cybercrime. Everyone from the Costa Rican government to Nvidia got hit. With the dominance of Bitcoin as a payment method in ransoming, tracking down perpetrators is infinitely more difficult than it used to be. The old adage holds more true than ever - an ounce of prevention is worth a pound of cure. To make matters worse, amongst all that chaos, organizations also had to pivot away from vulnerable, mainstream software solutions. Even if it’s just choosing a new image editor or integrating a PDF SDK, it’s an increasing burden for businesses that are already trying to modernize or simply maintain. Actors strike where we’re most vulnerable Healthcare organizations became more important than ever during the global coronavirus pandemic. But this time also saw unprecedented amounts of cybersecurity incidents take place as bad actors exploited outdated cybersecurity measures. The influx of sudden need caused many overburdened healthcare organizations to lose track of key cybersecurity protocols that could help shore up gaps in the existing protective measures. The United States healthcare industry saw a 25% spike in successful data breaches during the pandemic, which resulted in millions of dollars of damages and the loss of privacy for thousands of patients whose data was compromis Data Breach Vulnerability Threat Studies Prediction ChatGPT ★★
The_State_of_Security.webp 2023-12-27 00:00:07 2023 Rapport d'impact commercial: petites entreprises et cyberattaques
2023 Business Impact Report: Small Businesses and Cyberattacks
(lien direct)
Nous vivons dans un monde très numérisé, et les petites entreprises et les solopreneurs sont devenus des cibles privilégiées pour les cybercriminels.Le rapport d'impact commercial de 2023, réalisé par le Centre de ressources de vol d'identité (ITRC), met en lumière une tendance préoccupante: une forte augmentation des cyberattaques sur ces petites entités.Ce rapport annuel révèle que 73% des propriétaires de petites entreprises et des dirigeants ont connu des violations de données ou des cyberattaques au cours de la dernière année, une augmentation significative.Résultats clés Le rapport sur l'impact commercial de 2023 dépeint un tableau qui donne à réfléchir le paysage en évolution de la cybersécurité pour les petites entreprises.Au dessus de...
We live in a highly digitized world, and small businesses and solopreneurs have become prime targets for cybercriminals. The 2023 Business Impact Report , conducted by the Identity Theft Resource Center (ITRC), sheds light on a concerning trend: a sharp rise in cyberattacks on these smaller entities. This annual report reveals that 73% of small business owners and leaders experienced data breaches or cyberattacks in the past year, a significant increase. Key Findings The 2023 Business Impact Report paints a sobering picture of the evolving cybersecurity landscape for small businesses. Over the...
Studies Prediction ★★★
ESET.webp 2023-12-22 10:50:20 Résultats clés du rapport de la menace ESET H2 2023 & # 8211;Semaine en sécurité avec Tony Anscombe
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
(lien direct)
Comment les cybercriminels profitent de la popularité de Chatgpt et d'autres outils de ses semblables pour diriger les gens vers des sites sommaires, ainsi que d'autres résultats intéressants du dernier rapport de menace d'Eset \\
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET\'s latest Threat Report
Tool Threat Studies ChatGPT ★★★★
SecureList.webp 2023-12-21 10:00:59 Windows CLFS et cinq exploits utilisés par les opérateurs de ransomwares (exploit # 4 & # 8211; CVE-2023-23376)
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376)
(lien direct)
Ceci est la cinquième partie de notre étude sur le système de fichiers journal commun (CLFS) et cinq vulnérabilités dans ce composant Windows OS qui ont été utilisés dans les attaques de ransomwares tout au long de l'année.
This is part five of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.
Ransomware Vulnerability Studies ★★
SecureList.webp 2023-12-21 10:00:56 Windows CLFS et cinq exploits utilisés par les opérateurs de ransomwares (exploit # 3 & # 8211; octobre 2022)
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022)
(lien direct)
Ceci est la quatrième partie de notre étude sur le système de fichiers journal commun (CLFS) et cinq vulnérabilités dans ce composant Windows OS qui ont été utilisés dans les attaques de ransomwares tout au long de l'année.
This is part four of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.
Ransomware Vulnerability Studies ★★
SecureList.webp 2023-12-21 10:00:53 Windows CLFS et cinq exploits utilisés par les opérateurs de ransomwares (exploit # 2 & # 8211; septembre 2022)
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022)
(lien direct)
Il s'agit de la troisième partie de notre étude sur le système de fichiers journaux commun (CLFS) et cinq vulnérabilités dans ce composant Windows OS qui ont été utilisés dans les attaques de ransomwares tout au long de l'année.
This is the third part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.
Ransomware Vulnerability Studies ★★
SecureList.webp 2023-12-21 10:00:47 Windows CLFS et cinq exploits utilisés par les opérateurs de ransomwares (exploit # 1 & # 8211; CVE-2022-24521)
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521)
(lien direct)
Il s'agit de la deuxième partie de notre étude sur le système de fichiers journaux commun (CLFS) et cinq vulnérabilités dans ce composant Windows OS qui ont été utilisées dans les attaques de ransomwares tout au long de l'année.
This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.
Ransomware Vulnerability Studies ★★
SecureList.webp 2023-12-21 10:00:01 Windows CLFS et cinq exploits utilisés par les opérateurs de ransomwares (exploit # 5 & # 8211; CVE-2023-28252)
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252)
(lien direct)
Il s'agit de la six partie de notre étude sur le système de fichiers journal commun (CLFS) et cinq vulnérabilités dans ce composant Windows OS qui ont été utilisés dans les attaques de ransomwares tout au long de l'année.
This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.
Ransomware Vulnerability Studies ★★
InfoSecurityMag.webp 2023-12-21 09:30:00 Les faux sites Web de livraison augmentent de 34% en décembre
Fake Delivery Websites Surge By 34% in December
(lien direct)
Le groupe-IB dit que les sites de phishing imitant les opérateurs postaux ont augmenté d'un troisième dans les 10 premiers jours de décembre
Group-IB says phishing sites mimicking postal operators have increased by a third in first 10 days of December
Studies ★★★★
Last update at: 2024-05-17 05:07:49
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter