Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-09-21 19:03:49 |
Pay-per-install services provide access to thousands of compromised computers (lien direct) |
>PrivateLoader malware, which enables cybercriminals to buy thousands of infected computers in the U.S. and in other regions, is one of the most prevalent security threats.
|
|
|
|
|
2022-09-20 20:17:02 |
Uber exposes Lapsus$ extortion group for security breach (lien direct) |
>In last week's security breach against Uber, the attackers downloaded internal messages from Slack as well as information from a tool used to manage invoices.
|
Tool
|
Uber
|
|
|
2022-09-16 18:41:24 |
Uber investigating security breach of several internal systems (lien direct) |
>Communications and engineering systems were taken offline after hacker sends images of repositories to cybersecurity researchers and The New York Times.
|
|
Uber
|
★★
|
|
2022-09-15 22:13:56 |
Report: Digital trust is critical, but many enterprises are not prioritizing it (lien direct) |
>One breach of digital trust can cause devastating reputational, regulatory and financial repercussions, according to ISACA's State of Digital Trust 2022 survey findings.
|
|
|
|
|
2022-09-14 17:22:49 |
North Korean cyberespionage actor Lazarus targets energy providers with new malware (lien direct) |
>Lazarus, a North Korean cyberespionage group, keeps hitting energy providers in the U.S., Canada and Japan with a new malware arsenal.
|
Malware
|
APT 38
|
|
|
2022-09-09 20:04:34 |
Impact of Samsung\'s most recent data breach unknown (lien direct) |
>The lack of transparency could be cause for concern, but the data that was stolen is not high value.
|
Data Breach
|
|
|
|
2022-09-09 15:25:18 |
The rise of Linux malware: 9 tips for securing the OSS (lien direct) |
>Jack Wallen ponders the rising tide of Linux malware and offers advice on how to help mitigate the issue.
|
Malware
|
|
|
|
2022-09-06 09:00:55 |
How to configure calendar and task notifications on Android 13 (lien direct) |
>Jack Wallen shows you how to configure Android notifications for both Google Calendar and task notifications, so you don't miss anything.
|
|
|
|
|
2022-08-25 20:06:21 |
How a business email compromise attack exploited Microsoft\'s multi-factor authentication (lien direct) |
>Mitiga says that MFA, even if improperly configured, is no panacea for preventing attackers from abusing compromised credentials.
|
|
|
|
|
2022-08-18 15:05:37 |
Android 13 cheat sheet: Everything you need to know (lien direct) |
>If you're an Android user, you'll need to know how to use Google's latest mobile operating system. Check out this cheat sheet to find out how to use Android 13.
|
|
|
|
|
2022-08-16 17:56:37 |
How to protect your industrial facilities from USB-based malware (lien direct) |
>USB-borne malware can infect your industrial equipment unless you take the proper precautions, says Honeywell.
|
Malware
|
|
|
|
2022-08-16 17:11:43 |
BazarCall attack increasingly used by ransomware threat actors (lien direct) |
Already three independent threat groups are using it to heavily target companies.
|
Ransomware
Threat
|
|
|
|
2022-08-16 16:35:01 |
Google officially launches Android 13 (lien direct) |
>Now rolling out to supported Pixel phones, the latest version of Android offers greater customization, audio improvements and tighter security and privacy controls.
|
|
|
|
|
2022-08-15 15:14:35 |
The conundrum of Android 13 and Pixel 6 facial recognition (lien direct) |
>Will face unlock ever come to the Pixel 6 phones? And will it arrive with the new Pixel 7? Jack Wallen ponders these questions as well as how the answer might affect Pixel owners.
|
|
|
|
|
2022-08-15 10:00:51 |
Russia\'s Shuckworm cyber group launching ongoing attacks on Ukraine (lien direct) |
Malware downloading data logging and other espionage tools aimed at Ukrainian organizations.
|
|
|
|
|
2022-08-11 19:47:10 |
Cisco reveals cyberattack on its corporate network (lien direct) |
>Though cybercriminals have published a list of breached files, Cisco said that no sensitive customer or employee data was compromised in the attack.
|
|
|
|
|
2022-08-11 18:26:43 |
85% of Android users are concerned about privacy (lien direct) |
>Google's security guidelines also drew the majority of this year's requests in apps, according to Kaspersky's Privacy Checker website.
|
|
|
|
|
2022-08-08 16:23:21 |
How to protect your organization from the top malware strains (lien direct) |
>A joint advisory from the U.S. and Australia offers tips on combating the top malware strains of 2021, including Agent Tesla, LokiBot, Qakbot, TrickBot and GootLoader.
|
Malware
|
|
|
|
2022-08-08 10:00:44 |
Deepfake attacks and cyber extortion are creating mounting risks (lien direct) |
>Email is the top delivery method used by cybercriminals deploying geopolitically-motivated attacks to try and move laterally inside networks, a new VMware report finds.
|
|
|
|
|
2022-08-04 13:34:26 |
Protect domain-joined computer passwords with Windows\' Local Administrator Password Solution (lien direct) |
Windows finally includes a tool to manage local admin passwords, but admins will still need to do some work to make it useful.
|
Tool
|
|
|
|
2022-08-02 22:30:39 |
Black Kite: Cost of data breach averages $15 million (lien direct) |
>With the median cost per incident coming in at $130,000, most data breaches do not cross the $1 million threshold.
|
Data Breach
|
|
|
|
2022-07-28 09:00:41 |
How attackers are adapting to a post-macro world (lien direct) |
>Since Microsoft's shutdown of macros in Office apps, attackers are using container file types to deliver malware in one of the largest threat landscape shifts in recent history.
|
Malware
Threat
|
|
|
|
2022-07-27 14:05:51 |
Infostealer malware targets Facebook business accounts to capture sensitive data (lien direct) |
>Ducktail malware tries to hijack the accounts of individuals who use Facebook's Business and Ads platforms, says WithSecure Intelligence.
|
Malware
|
|
|
|
2022-07-27 04:01:55 |
Average cost of data breach surpasses $4 million for many organizations (lien direct) |
>Beyond the immediate costs of a data breach, almost half of the total costs occur more than a year after the incident, says IBM Security.
|
Data Breach
|
|
|
|
2022-07-26 12:00:39 |
1Password password manager: How it works with apps (lien direct) |
>Keeping track of all of your passwords has never been easier. Learn how to fill and save passwords on your mobile device with 1Password.
|
|
|
|
|
2022-07-20 16:04:39 |
Acronis Cyber Protect Home Office: The full image backup tool to meet today\'s demanding needs (lien direct) |
Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease.
|
Tool
|
|
|
|
2022-07-19 16:14:48 |
Cyber Safety Review Board classifies Log4j as \'endemic vulnerability\' (lien direct) |
>CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack.
|
|
|
|
|
2022-07-19 15:45:10 |
Android 13 beta 4 has arrived to herald the full release (lien direct) |
>Android 13 beta 4 doesn't add any new features but fixes a number of bugs. Jack Wallen has the details and his opinion about what makes this release special.
|
|
|
|
|
2022-07-19 13:00:22 |
How to leverage the power of cyber fusion centers for organizational security (lien direct) |
>Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center.
|
|
|
|
|
2022-07-18 14:01:19 |
Best tech products and most innovative AI/ML companies of 2022 (lien direct) |
>TechRepublic contributing writers ranked the best technology products and companies of the year in multiple categories, including VPNs, password managers, remote work setups and more.
|
|
|
|
|
2022-07-13 15:59:02 |
Twitter sues Elon Musk over aborted purchase (lien direct) |
>The company alleges that the Tesla founder's attempt to renege on his deal is in breach of the previously signed commitment.
|
|
|
|
|
2022-07-12 15:27:08 |
How security vulnerabilities pose risks for healthcare organizations (lien direct) |
>An analysis by Cyber SecurityWorks uncovered 624 vulnerabilities that cybercriminals could exploit to target healthcare facilities.
|
|
|
|
|
2022-07-12 14:00:08 |
Reskilling heroes: Understanding the new opportunities for vets in America\'s fast-growing cyber sector (lien direct) |
These nonprofit organizations can help veterans get started in the cybersecurity industry.
|
|
|
|
|
2022-07-08 15:43:06 |
SMBs are behind in adopting multi-factor authentication (lien direct) |
>Only a quarter of the SMBs surveyed by the Cyber Readiness Institute require MFA among employees to sign into applications and devices.
|
|
|
|
|
2022-07-08 15:29:56 |
The consequences of SaaS sprawl don\'t end with cyber risk (lien direct) |
>Software isn't just part of the workplace anymore: It is the workplace. Learn the solution to shadow IT and application sprawl now.
|
|
|
|
|
2022-07-07 19:06:34 |
China suffers massive cybersecurity breach affecting over 1 billion people (lien direct) |
>Cybercriminals found a way into a Shanghai National Police database, in the largest exploit of personal information in the country's history.
|
|
|
|
|
2022-07-07 15:18:45 |
(Déjà vu) North Korean-sponsored ransomware attacks target US healthcare companies (lien direct) |
>Since May of 2021, state-sponsored attackers have been deploying Maui ransomware in an attempt to encrypt sensitive records and disrupt services for vulnerable healthcare organizations.
|
Ransomware
|
|
|
|
2022-07-07 15:18:45 |
North Korean ransomware attacks target US healthcare companies (lien direct) |
>Since May of 2021, state-sponsored attackers have been deploying Maui ransomware in an attempt to encrypt sensitive records and disrupt services for vulnerable healthcare organizations.
|
Ransomware
|
|
|
|
2022-07-06 20:53:22 |
How to make voice and video calls from the Gmail app (lien direct) |
>You can kick off a voice and video call from Gmail's mobile app on your iPhone or Android phone. Here's how.
|
|
|
|
|
2022-07-06 19:37:26 |
How cyber criminals are targeting Amazon Prime Day shoppers (lien direct) |
>With Amazon Prime Day 2022 set for July 12 and 13, Check Point Research is already seeing phishing emails and suspicious domains designed to scam prospective shoppers.
|
|
|
|
|
2022-07-06 19:13:01 |
NIST selects four encryption algorithms to thwart future quantum computer attacks (lien direct) |
>The announcement follows a six-year effort to devise and then vet encryption methods to significantly increase the security of digital information, the agency said.
|
|
|
|
|
2022-07-05 13:48:52 |
PennyWise malware on YouTube targets cryptocurrency wallets and browsers (lien direct) |
Learn more about how this stealer malware operates and how to protect yourself from it now.
|
Malware
|
|
|
|
2022-07-01 17:57:34 |
The business of hackers-for-hire threat actors (lien direct) |
>Hackers-for-hire specialize in compromising email boxes. Learn more about these cyber criminals and the threat they represent.
|
Threat
|
|
|
|
2022-07-01 17:03:00 |
Data breach of NFT marketplace OpenSea may expose customers to phishing attacks (lien direct) |
>Triggered by an employee from an external vendor who shared email addresses with an unauthorized party, the breach could lead to phishing attempts against affected individuals.
|
Guideline
|
|
|
|
2022-06-30 21:00:49 |
Managing the element of risk in projects (lien direct) |
Are the best project managers risk managers?
|
|
|
|
|
2022-06-30 19:16:29 |
How traditional security tools fail to protect companies against ransomware (lien direct) |
>Most organizations surveyed by Titaniam have existing security prevention and backup tools, but almost 40% have still been hit by ransomware attacks in the last year.
|
Ransomware
Tool
|
|
|
|
2022-06-30 18:06:45 |
(Déjà vu) Tech News You May Have Missed: June 23-30 (lien direct) |
>We look back to the previous week in TechRepublic's publishings and take a look at the five biggest stories.
|
|
|
|
|
2022-06-30 17:43:55 |
Collaborating across IT operations for a stronger enterprise environment (lien direct) |
>IT operations now requires more collaboration. Learn the roles of DevOps, NetOps and NetSecOps and how to encourage them to work together.
|
|
|
|
|
2022-06-30 17:25:33 |
Amazon CTO shares the secret to writing great code (lien direct) |
>The best code will run for decades, says Amazon CTO Werner Vogels. How can you make sure your code will last?
|
|
|
|
|
2022-06-30 15:51:52 |
What you should change on your file server with Windows Server 2022 (lien direct) |
>It's time to take advantage of new storage and file networking features in the latest Windows releases.
|
|
|
|