Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-06-23 15:17:24 |
Cyber Heist Probe: Bangladesh May End Contract With FireEyehttp://ubm.io/28Ppufb (lien direct) |
Cyber Heist Probe: Bangladesh May End Contract With FireEyehttp://ubm.io/28Ppufb |
|
|
|
|
2016-06-22 23:16:56 |
5 Tips For Making Data Privacy Part Of The Company's Culturehttp://ubm.io/28O8PbX (lien direct) |
5 Tips For Making Data Privacy Part Of The Company's Culturehttp://ubm.io/28O8PbX |
|
|
|
|
2016-06-22 23:16:56 |
Crypto Ransomware Officially Eclipses Screen-Blocker Ransomwarehttp://ubm.io/28YwLco (lien direct) |
Crypto Ransomware Officially Eclipses Screen-Blocker Ransomwarehttp://ubm.io/28YwLco |
|
|
|
|
2016-06-22 22:16:43 |
Microsoft Rolls Out New Data Classification And Security Servicehttp://ubm.io/28NgGnf (lien direct) |
Microsoft Rolls Out New Data Classification And Security Servicehttp://ubm.io/28NgGnf |
|
|
|
|
2016-06-22 21:05:22 |
#BlackHat CISO Summit: Just 48 hours left to apply to attend. Application deadline is Friday, June 23 http://ow.ly/AR9J301vfyW (lien direct) |
CISO Summit: Just 48 hours left to apply to attend. Application deadline is Friday, June 23 http://ow.ly/AR9J301vfyW |
|
|
|
|
2016-06-22 19:19:01 |
How To Lock Down So Ransomware Doesn't Lock You Outhttp://ubm.io/28PSAMK (lien direct) |
How To Lock Down So Ransomware Doesn't Lock You Outhttp://ubm.io/28PSAMK |
|
|
|
|
2016-06-22 17:18:06 |
'Bug Poachers:' A New Breed of Cybercriminalhttp://ubm.io/28PJ4KA (lien direct) |
'Bug Poachers:' A New Breed of Cybercriminalhttp://ubm.io/28PJ4KA |
|
|
|
|
2016-06-22 15:17:21 |
Majority Of SMBs Would Not Pay Ransomware Attackershttp://ubm.io/28QXrgo (lien direct) |
Majority Of SMBs Would Not Pay Ransomware Attackershttp://ubm.io/28QXrgo |
|
|
|
|
2016-06-22 15:17:21 |
Bangladesh Bank To Meet With NY Fed Over Pilfered $81 Millionhttp://ubm.io/28NjOSI (lien direct) |
Bangladesh Bank To Meet With NY Fed Over Pilfered $81 Millionhttp://ubm.io/28NjOSI |
|
|
|
|
2016-06-22 00:17:14 |
Guccifer 2.0: Red Herring Or Third DNC Hacker?http://ubm.io/28M8DLW (lien direct) |
Guccifer 2.0: Red Herring Or Third DNC Hacker?http://ubm.io/28M8DLW |
|
|
|
|
2016-06-21 22:23:46 |
A look back at 10 years of security:http://ubm.io/28TlDNF (lien direct) |
A look back at 10 years of security:http://ubm.io/28TlDNF |
|
|
|
|
2016-06-21 21:30:13 |
The Wicked Truths About #Malware vs #Exploits: Crash Course from @SentinelSec http://ubm.io/28MxFeV (lien direct) |
The Wicked Truths About vs : Crash Course from http://ubm.io/28MxFeV |
|
|
|
|
2016-06-21 21:24:51 |
Math vs. Malware: How @Cylance Uses Math to Defeat #Malware: #machinelearning #Whitepaper http://ubm.io/28QCTlE (lien direct) |
Math vs. Malware: How Uses Math to Defeat : http://ubm.io/28QCTlE |
|
|
|
|
2016-06-21 21:19:21 |
The Agile Security Manifesto: @cigital #whitepaper describes 4 principles to guide us to build secure software http://ubm.io/28Ne7FK (lien direct) |
The Agile Security Manifesto: describes 4 principles to guide us to build secure software http://ubm.io/28Ne7FK |
|
|
|
|
2016-06-21 20:16:38 |
'Hack The Pentagon' Paid 117 Hackers Who Found Bugs In DoD Websiteshttp://ubm.io/28NqIbe (lien direct) |
'Hack The Pentagon' Paid 117 Hackers Who Found Bugs In DoD Websiteshttp://ubm.io/28NqIbe |
|
|
|
|
2016-06-21 17:25:15 |
https://twitter.com/SkyboxSecurity/status/745289590186057728 … (lien direct) |
https://twitter.com/SkyboxSecurity/status/745289590186057728 … |
|
|
|
|
2016-06-21 17:18:04 |
Phishing, Whaling & The Surprising Importance Of Privileged Usershttp://ubm.io/28LeJti (lien direct) |
Phishing, Whaling & The Surprising Importance Of Privileged Usershttp://ubm.io/28LeJti |
|
|
|
|
2016-06-21 17:01:44 |
The BYOD global market is rapidly growing but EMS falls short in securing devices. #BHUSA Briefing by @vincent_tky http://ow.ly/sBal301sDFn (lien direct) |
The BYOD global market is rapidly growing but EMS falls short in securing devices. Briefing by http://ow.ly/sBal301sDFn |
|
|
|
|
2016-06-21 16:01:32 |
.@cooperq & @evacide will reveal attacks from the government against activists, lawyers, & journalists at #BHUSA http://ow.ly/yn8D301sDCn (lien direct) |
. & will reveal attacks from the government against activists, lawyers, & journalists at http://ow.ly/yn8D301sDCn |
|
|
|
|
2016-06-21 15:16:03 |
Acer's Website Hacked, Customer Data Stolenhttp://ubm.io/28KXngq (lien direct) |
Acer's Website Hacked, Customer Data Stolenhttp://ubm.io/28KXngq |
|
|
|
|
2016-06-21 15:16:03 |
GoToMyPC Resets Customer Passwords In Wake Of Attackhttp://ubm.io/28KzEv2 (lien direct) |
GoToMyPC Resets Customer Passwords In Wake Of Attackhttp://ubm.io/28KzEv2 |
|
|
|
|
2016-06-21 15:16:03 |
7 Need-To-Know Attack Statshttp://ubm.io/28KzCnb (lien direct) |
7 Need-To-Know Attack Statshttp://ubm.io/28KzCnb |
|
|
|
|
2016-06-21 10:00:47 |
Learn how to transmit, receive, & analyze radio signals to implement SDR projects #BHUSA Training w/ @michaelossmann http://ow.ly/monR301sE3y (lien direct) |
Learn how to transmit, receive, & analyze radio signals to implement SDR projects Training w/ http://ow.ly/monR301sE3y |
|
|
|
|
2016-06-21 01:28:04 |
China Still Successfully Hacking US, But Lesshttp://ubm.io/28KTFp0 (lien direct) |
China Still Successfully Hacking US, But Lesshttp://ubm.io/28KTFp0 |
|
|
|
|
2016-06-20 19:16:24 |
5 Tips For Staying Cyber-Secure On Your Summer Vacationhttp://ubm.io/28JNwbY (lien direct) |
5 Tips For Staying Cyber-Secure On Your Summer Vacationhttp://ubm.io/28JNwbY |
|
|
|
|
2016-06-20 19:16:24 |
A Real World Analogy For Patterns of Attackhttp://ubm.io/28LTTue (lien direct) |
A Real World Analogy For Patterns of Attackhttp://ubm.io/28LTTue |
|
|
|
|
2016-06-20 18:16:46 |
Privacy Shield: Can the US Earn the EU's Trust Post Apple vs. FBI?http://ubm.io/28LtE7y (lien direct) |
Privacy Shield: Can the US Earn the EU's Trust Post Apple vs. FBI?http://ubm.io/28LtE7y |
|
|
|
|
2016-06-20 14:16:09 |
Veterans Administration Adopts UL Security Certification Program For Medical Deviceshttp://ubm.io/28Jbh3n (lien direct) |
Veterans Administration Adopts UL Security Certification Program For Medical Deviceshttp://ubm.io/28Jbh3n |
|
|
|
|
2016-06-18 19:00:56 |
Companies can avoid more exploits by joining an open ecosystem, exposing direct & related vulns #BHUSA Briefing http://ow.ly/Dw4C301nKkY (lien direct) |
Companies can avoid more exploits by joining an open ecosystem, exposing direct & related vulns Briefing http://ow.ly/Dw4C301nKkY |
|
|
|
|
2016-06-18 16:19:35 |
The Gamble Behind Cyber Threat Intelligence Sharinghttp://ubm.io/1W5zaom (lien direct) |
The Gamble Behind Cyber Threat Intelligence Sharinghttp://ubm.io/1W5zaom |
|
|
|
|
2016-06-17 20:01:39 |
The full agenda has been posted for #BHUSA CISO Summit on Tuesday, August 2nd – Apply to attend by June 23rd: http://ow.ly/1YkA301l22s (lien direct) |
The full agenda has been posted for CISO Summit on Tuesday, August 2nd – Apply to attend by June 23rd: http://ow.ly/1YkA301l22s |
|
|
|
|
2016-06-17 16:16:51 |
Lone Hacker Taking Credit For DNC Breach Is Likely Russian, Says Researcherhttp://ubm.io/267DxSQ (lien direct) |
Lone Hacker Taking Credit For DNC Breach Is Likely Russian, Says Researcherhttp://ubm.io/267DxSQ |
|
|
|
|
2016-06-17 16:16:51 |
NATO Officially Declares Cyberspace A Domain For Warhttp://ubm.io/1YwJKWb (lien direct) |
NATO Officially Declares Cyberspace A Domain For Warhttp://ubm.io/1YwJKWb |
|
|
|
|
2016-06-17 15:18:03 |
An Inside Look at the Mitsubishi Outlander Hackhttp://ubm.io/1ZWjva5 (lien direct) |
An Inside Look at the Mitsubishi Outlander Hackhttp://ubm.io/1ZWjva5 |
|
|
|
|
2016-06-17 13:19:08 |
Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Reports Sayshttp://ubm.io/1Qbl2ZR (lien direct) |
Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Reports Sayshttp://ubm.io/1Qbl2ZR |
|
|
|
|
2016-06-16 21:21:10 |
(Déjà vu) Managing Insider Threats During Workforce Reductions: @nuix #Whitepaper http://ubm.io/21p4z4L Think #relocation #paycuts #RIF (lien direct) |
Managing Insider Threats During Workforce Reductions: http://ubm.io/21p4z4L Think |
|
|
|
|
2016-06-16 21:20:11 |
(Déjà vu) A Holistic Approach to Counter #InsiderThreats: @nuix #Whitepaper details effective technical & non-tech strategies http://ubm.io/21p3NEO (lien direct) |
A Holistic Approach to Counter : details effective technical & non-tech strategies http://ubm.io/21p3NEO |
|
|
|
|
2016-06-16 21:17:45 |
Apply Threat Intel to #StarWars' Battle of Yavin; @ThreatConnect Whitepaper applies Diamond Model 2 Empire v Rebels http://ubm.io/1UY9Knt (lien direct) |
Apply Threat Intel to ' Battle of Yavin; Whitepaper applies Diamond Model 2 Empire v Rebels http://ubm.io/1UY9Knt |
|
|
|
|
2016-06-16 21:05:19 |
Understand risks your SAP platform may be facing & how to assess & mitigate them #BHUSA Training w/ @chrisbisnett http://ow.ly/lyos301iRRj (lien direct) |
Understand risks your SAP platform may be facing & how to assess & mitigate them Training w/ http://ow.ly/lyos301iRRj |
|
|
|
|
2016-06-16 19:59:25 |
(Déjà vu) About that MSFT bug #BHUSA RT @DarkReading: Windows ‘BadTunnel’ Attack Hijacks Network Traffichttp://ubm.io/21mcU9n (lien direct) |
About that MSFT bug RT : Windows ‘BadTunnel’ Attack Hijacks Network Traffichttp://ubm.io/21mcU9n |
|
|
|
|
2016-06-16 19:30:55 |
PINdemonium is a DBI-Based generic unpacker that tries to reconstruct a working PE from its packed version #BHUSA http://ow.ly/O2rl301iRKK (lien direct) |
PINdemonium is a DBI-Based generic unpacker that tries to reconstruct a working PE from its packed version http://ow.ly/O2rl301iRKK |
|
|
|
|
2016-06-16 19:19:35 |
Internet of Things Meets Tech Supporthttp://ubm.io/1ZUn8xn (lien direct) |
Internet of Things Meets Tech Supporthttp://ubm.io/1ZUn8xn |
|
|
|
|
2016-06-16 19:19:35 |
Pretty Good Passwords: Cartoon Caption Contest Winnershttp://ubm.io/1tyNH0Y (lien direct) |
Pretty Good Passwords: Cartoon Caption Contest Winnershttp://ubm.io/1tyNH0Y |
|
|
|
|
2016-06-16 18:05:23 |
O-checker uses deviations from file format specifications to detect malicious malware in email. #BHUSA Briefing http://ow.ly/ocbi301iQTi (lien direct) |
O-checker uses deviations from file format specifications to detect malicious malware in email. Briefing http://ow.ly/ocbi301iQTi |
|
|
|
|
2016-06-16 17:05:27 |
HEIST brings network-level attacks to the browser with a set of novel attack techniques #BHUSA Briefing http://ow.ly/b18g301iQHG (lien direct) |
HEIST brings network-level attacks to the browser with a set of novel attack techniques Briefing http://ow.ly/b18g301iQHG |
|
|
|
|
2016-06-16 16:19:06 |
US, China Agree To Set Up A Cyber Hotlinehttp://ubm.io/1YuI7b8 (lien direct) |
US, China Agree To Set Up A Cyber Hotlinehttp://ubm.io/1YuI7b8 |
|
|
|
|
2016-06-16 16:19:06 |
For $6, Buy Access To Hacked Government Server, On Underground Markethttp://ubm.io/24TXTMP (lien direct) |
For $6, Buy Access To Hacked Government Server, On Underground Markethttp://ubm.io/24TXTMP |
|
|
|
|
2016-06-16 16:05:19 |
Has Microsoft finally killed script-based attacks w/ the introduction of AMSI? @nikhil_mitt will demo some answers http://ow.ly/PN8H301iQPa (lien direct) |
Has Microsoft finally killed script-based attacks w/ the introduction of AMSI? will demo some answers http://ow.ly/PN8H301iQPa |
|
|
|
|
2016-06-16 15:16:49 |
Symantec's Purchase of Blue Coat Fills Critical Product Gap, Interim President Sayshttp://ubm.io/21osvVM (lien direct) |
Symantec's Purchase of Blue Coat Fills Critical Product Gap, Interim President Sayshttp://ubm.io/21osvVM |
|
|
|
|
2016-06-15 22:05:47 |
Live streaming videocast noon 6/30 EDT: The Great Debate: The State of #AppSec w @csoandy @jack_daniel & @WeldPond http://ubm.io/1ZRXXLK (lien direct) |
Live streaming videocast noon 6/30 EDT: The Great Debate: The State of w & http://ubm.io/1ZRXXLK |
|
|
|