What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2023-03-20 14:00:00 Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model (lien direct) There are a number of solutions that can help ensure security and compliance mandates are met in the cloud, but organizations should prioritize integration and policy-based management. Cloud ★★
globalsecuritymag.webp 2023-03-20 07:54:05 Evanssion partners with ExtraHop (lien direct) Evanssion partners with ExtraHop to provide regional businesses with enterprise-grade security and cloud scalability The partnership enhances and deepens Evanssion's diverse cyber defense stack offering for partners and enterprises. - Business News Cloud ★★
silicon.fr.webp 2023-03-17 16:24:02 Open source : une valeur sûre pour les développeurs (lien direct) Open source, Cloud computing et Machine learning sont considérés comme les technologies les plus éprouvées par les développeurs. Cloud ★★★
The_Hackers_News.webp 2023-03-17 16:16:00 A New Security Category Addresses Web-borne Threats (lien direct) In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser is now the most important work interface. The browser connects employees to managed resources, devices to the web, and the on-prem environment to the cloud one. Yet, and probably unsurprisingly, this browser prominence has significantly increased the number of General Information Cloud ★★★
RedCanary.webp 2023-03-17 15:47:26 Improve your cyber threat coverage with Microsoft E5 (lien direct) Learn how all of the Microsoft E5 license security features can improve your cyber threat coverage and operational ROI. Threat Cloud ★★★
Checkpoint.webp 2023-03-17 11:00:13 CNAPP in a Snap - How Agentless Workload Posture Improves Security Velocity (lien direct) >By Benny Zemmour – Group Manager Cloud Security Why Modern Development Demands an Agentless Workload Protection Solution What can you do when your security tools are holding you back? Are the solutions that keep you safe also inhibiting innovation? When your developers are creating something new and amazing, you don't put anything in their way.… General Information Cloud ★★
Fortinet.webp 2023-03-16 13:09:00 How Best to Secure Applications in Any Cloud (lien direct) Read about some of the barriers to cloud adoption along with the risks and challenges that come with it to secure your applications. Cloud ★★
silicon.fr.webp 2023-03-16 08:45:50 Salesforce : derrière Einstein GPT, la timide appropriation du Web3 (lien direct) Salesforce rebaptise sa solution NFT Cloud et en étend un peu la disponibilité dans le cadre d'une offre Web3. Cloud ★★
SonarSource.webp 2023-03-16 00:00:00 Fonctionnalités natives dans le cloud dans Sonarqube 9.9 LTS
Cloud native features in SonarQube 9.9 LTS
(lien direct)
Le meilleur LTS de tous les temps - Sonarqube V9.9 - a emballé beaucoup de nouvelles fonctionnalités et de nouvelles fonctionnalités.En savoir plus pour en savoir plus sur les capacités d'analyse native, IAC et sans serveur incluses dans le LTS.
The best LTS ever - SonarQube v9.9 - packed together a lot of new features and functionality. Read more to learn about the cloud native, IaC and serverless analysis capabilities included in the LTS.
Cloud ★★
globalsecuritymag.webp 2023-03-15 19:56:02 CPX 360 in München (lien direct) Check Point möchte in der Lage sein, Angriffe zu verhindern, anstatt sie nur zu erkennen, und entwickelt daher seine Lösungen so, dass die gesamte Sicherheitsumgebung, also Netzwerk, Cloud und Remote-Benutzer sofort lernen und handeln, selbst wenn nur über einen einzigen Vektor angegriffen wird. Die Herausforderung liegt hier eindeutig in der zunehmenden Anzahl von Permutationen, denen Check Point mit 30 Jahren Threat Intelligence zu begegnen versucht. Das eigene Infinity Portal umfasst Quantum für die Absicherung des Netzwerks, Cloudgard für die Cloud-Sicherheit und Harmony für die Benutzer- und Gerätesicherheit, die alle zusammenarbeiten können, um eine ganzheitliche Cybersicherheitslösung zu gewährleisten. - Sonderberichte / Threat Cloud
globalsecuritymag.webp 2023-03-15 17:24:48 Le point sur les mesures de Cyberprotection (lien direct) Le point sur les mesures de Cyberprotection Par Steve José Lourenço Architecte Cloud ITS Integra L'importance de l'antivirus, d'un PRA et de la sauvegarde immuable Une menace toujours aussi présente - Points de Vue General Information Cloud ★★
Netskope.webp 2023-03-15 13:00:00 Understanding Data Protection Needs in a Cloud-enabled Hybrid Work World (lien direct) >Today, Netskope partnered with the Cloud Security Alliance to release the Data Loss Prevention (DLP) and Data Security Survey Report, a survey focused on data protection needs in cloud and hybrid work environments. Unsurprisingly, the report found that the biggest pain point organizations identify with trying to modernize their data protection strategy is that current […] Guideline Cloud ★★★
silicon.fr.webp 2023-03-15 11:53:55 Xavier Pestel – Weborama : " Nous faisons du Kubernetes au quotidien " (lien direct) Xavier Pestel, Lead SRE (Site Reliability Engineering) détaille comment il pilote l'infrastructure DMP de Weborama, qui s'appuie sur deux fournisseurs de Cloud public, avec Kubernetes. Guideline Guideline Cloud Uber ★★★
AlienVault.webp 2023-03-15 10:00:00 10 Ways B2B companies can improve mobile security (lien direct) The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Mobile security refers to the technologies and processes that are used to protect mobile devices from malicious attacks, data breaches, and other forms of cybercrime. It also includes measures taken to safeguard personal information stored on these devices, as well as protecting them from physical damage or theft. Mobile security is becoming increasingly important due to the rapid proliferation of smartphones and tablets being used for business purposes around the world. Businesses need to take steps to ensure their data remains secure when accessing company networks via mobile devices, including implementing a few key measures. Below are ten ways B2B companies can do better mobile security. 1. Use a secure email provider A secure domain email address is one of the most important ways to ensure that company emails and other sensitive data remain safe. Email providers such as Google, Microsoft, Zoho, and Postale offer secure domain email addresses which encrypt all emails sent and received in transit. This makes it more difficult for hackers to gain access to confidential information or launch attacks on vulnerable systems. Using a secure email provider is essential for any organization looking to maximize its data protection efforts. By taking advantage of these services, businesses can rest assured knowing their emails are secure and protected from malicious actors. 2. Implement strong authentication Strong authentication refers to the use of two or more forms of authentication to authenticate a user's identity. This could include using a one-time password for each login, biometric factors such as fingerprints, or utilizing an encrypted token. Strong authentication ensures that only authorized users can access company networks and confidential data. Having strong authentication measures in place is an essential step in protecting data, as it helps to prevent unauthorized access and keeps sensitive information secure. 3. Install mobile security software Mobile security software (also known as mobile device management or MDM) can help protect devices from malicious attacks. Mobile security software can be installed on all company-owned devices, providing a layer of protection by scanning for and blocking malicious applications. It can also offer additional layers of protection such as remote wiping capability, encryption, and the ability to remotely lock lost or stolen devices. 4. Enforce use policies By having clear use policies in place, businesses can ensure their employees understand the importance of mobile security and that they are adhering to the established rules. These policies should include restrictions on downloading or installing unapproved apps, accessing unknown or suspicious websites, or sharing confidential information with unauthorized personnel. Enforcing use policies is essential for keeping company networks and data secure. By ensuring that all employees abide by the same set of rules, businesses can greatly reduce their risk of a data breach or other malicious attack. 5. Utilize cloud storage Cloud storage provides an effective way to store business data securely off-site. Data stored in the cloud is encrypted and kept safe from physical damage or theft. It also eliminates the need for large servers and other physical infrastructure, reducing both costs and the potential risk of data breaches. Additionally, cloud storage allows employees to access their data from any device, anytime and anywhere Data Breach Malware Guideline Cloud ★★★
DarkReading.webp 2023-03-14 21:05:00 Samsung Next Invests in Mitiga, Brings Total Funding to $45M (lien direct) Financing will help support increasing customer demand while continuing to transform incident response for cloud and SaaS environments Cloud ★★
RecordedFuture.webp 2023-03-14 20:36:00 Hackers used Fortra zero-day to steal sales data from cloud management giant Rubrik (lien direct) Cloud data management giant Rubrik confirmed that hackers attacked the company using a vulnerability in a popular file transfer tool. The Clop ransomware group – which has been the primary force behind the [exploitation of a vulnerability](https://therecord.media/forta-goanywhere-mft-file-transfer-zero-day) affecting Fortra's GoAnywhere Managed File Transfer product – added Rubrik to its list of victims on Tuesday. A Ransomware Vulnerability Cloud ★★
Netskope.webp 2023-03-14 18:17:21 Cloud Threats Memo: Cyber Espionage Campaign Using Remote Access Tools (lien direct) >Another day, another cyber espionage campaign exploiting two legitimate and well-known cloud services to deliver the malicious payload. Once again, this campaign was unearthed by researchers at Sentinel One, and it is aimed to distribute the Remcos Remote Access Tool (yet another example of a remote control tool used for malicious purposes) through the DBatLoader […] Tool Cloud ★★★
CVE.webp 2023-03-14 18:15:10 CVE-2023-27588 (lien direct) Hasura is an open-source product that provides users GraphQL or REST APIs. A path traversal vulnerability has been discovered within Hasura GraphQL Engine prior to versions 1.3.4, 2.55.1, 2.20.1, and 2.21.0-beta1. Projects running on Hasura Cloud were not vulnerable. Self-hosted Hasura Projects with deployments that are publicly exposed and not protected by a WAF or other HTTP protection layer should be upgraded to version 1.3.4, 2.55.1, 2.20.1, or 2.21.0-beta1 to receive a patch. Vulnerability Cloud
globalsecuritymag.webp 2023-03-14 00:30:00 Grip Security & The Syndicate Group (TSG) Announce Strategic Investment (lien direct) Grip Security & The Syndicate Group (TSG) Announce Strategic Investment to Accelerate Channel-Led Growth Grip Solutions Meet Critical Need for Channel Ecosystem to Manage SaaS Risk; TSG Expands Reach to 450+ Strategic Partners - Business News Cloud ★★
CVE.webp 2023-03-13 22:15:12 CVE-2023-27587 (lien direct) ReadtoMyShoe, a web app that lets users upload articles and listen to them later, generates an error message containing sensitive information prior to commit 8533b01. If an error occurs when adding an article, the website shows the user an error message. If the error originates from the Google Cloud TTS request, then it will include the full URL of the request. The request URL contains the Google Cloud API key. See below for what this error message looks like, with redaction. This has been patched in commit 8533b01. Upgrading should be accompanied by deleting the current GCP API key and issuing a new one. There are no known workarounds. Cloud
CVE.webp 2023-03-13 21:15:13 CVE-2023-0346 (lien direct) Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known. Cloud
The_Hackers_News.webp 2023-03-13 17:53:00 How to Apply NIST Principles to SaaS in 2023 (lien direct) The National Institute of Standards and Technology (NIST) is one of the standard-bearers in global cybersecurity. The U.S.-based institute's cybersecurity framework helps organizations of all sizes understand, manage, and reduce their cyber-risk levels and better protect their data. Its importance in the fight against cyberattacks can't be overstated. While NIST hasn't directly developed Cloud ★★★
globalsecuritymag.webp 2023-03-13 17:42:53 Dans son rapport sur la sécurité des applications et des API, GigaOm place Check Point Software au rang de leader de l\'innovation (lien direct) Dans son rapport sur la sécurité des applications et des API, GigaOm place Check Point Software au rang de leader de l'innovation Check Point CloudGuard AppSec (Application Security) se distingue car il utilise l'intelligence artificielle préemptive pour bloquer de manière proactive les attaques complexes de type " zero-day " et pour sécuriser les applications cloud des entreprises - Magic Quadrant Guideline Cloud ★★★
silicon.fr.webp 2023-03-13 17:12:39 FinOps : 4 certifications qui valorisent votre expertise (lien direct) Les certifcations de la FinOps Foundation et d'hyperscalers cloud peuvent distinguer les compétences et doper les parcours d'ingénieurs et profils IT. Cloud ★★
RedCanary.webp 2023-03-13 16:10:05 Streamlined and secure: Red Canary upgrades to SentinelOne Cloud Funnel 2.0 (lien direct) Red Canary now supports SentinelOne's newest data export mechanism, Cloud Funnel 2.0, providing customers with more enriched XDR data. Cloud ★★
InfoSecurityMag.webp 2023-03-13 15:30:00 Unlocking the Benefits and Trade-Offs of Agentless Cloud Security (lien direct) Agentless cloud security solutions were among the most talked-about topics during the Cloud & Cyber Security Expo, set in London on March 8-9, 2023 Cloud ★★★
globalsecuritymag.webp 2023-03-13 14:14:44 GigaOm Recognizes Check Point Software as a Leader in Innovation in its Application and API Security Report (lien direct) GigaOm Recognizes Check Point Software as a Leader in Innovation in its Application and API Security Report Check Point CloudGuard AppSec (Application Security) stands out for using Preemptive Artificial Intelligence (AI) to proactively block complex zero-day attacks and secure organizations' Cloud Applications - Malware Update Guideline Cloud ★★
Netskope.webp 2023-03-10 21:09:16 Realizing the True Power of Netskope Cloud Exchange (lien direct) >When I talk to customers and partners about Cloud Threat Exchange (CTE), I immediately say, “I'm not in marketing, and didn't see the future-so I misnamed the module. I should have named it Cloud Data Exchange.” Why do I say this? Because, as Netskope and Cloud Exchange have matured, the number of use cases the […] Threat Cloud ★★★
silicon.fr.webp 2023-03-10 16:24:15 Cloud : le FinOps et la sécurité d\'abord (lien direct) Les équipes chargées de la gestion cloud font du contrôle des coûts la principale priorité, devant la sécurité. Une première en une décennie. Cloud ★★★
bleepingcomputer.webp 2023-03-10 11:30:18 Blackbaud to pay $3M for misleading ransomware attack disclosure (lien direct) Cloud software provider Blackbaud has agreed to pay $3 million to settle charges brought by the Securities and Exchange Commission (SEC), alleging that it failed to disclose the full impact of a 2020 ransomware attack that affected more than 13,000 customers. [...] Ransomware Cloud ★★
globalsecuritymag.webp 2023-03-10 11:01:30 SentinelOne et Wiz annoncent un partenariat exclusif pour proposer une solution de sécurité cloud (lien direct) SentinelOne et Wiz annoncent un partenariat exclusif pour proposer une solution de sécurité cloud globale Deux entreprises de cybersécurité de premier plan unissent leurs forces pour améliorer la sécurité de leurs clients dans le cloud - Business Cloud ★★
InfoSecurityMag.webp 2023-03-09 11:45:00 Understanding the Shared Responsibility Model, Critical Step to Ensure Cloud Security (lien direct) During the Cloud & Cyber Security Expo, cloud security experts attributed the security shortcomings of cloud users to misconceptions over their responsibility Cloud ★★★
Checkpoint.webp 2023-03-09 11:00:18 Is your security team concerned with unmanaged devices? (lien direct) >Secure all your organization's devices in a few clicks. By Antoine Korulski and Adi Goldshtein Harel CISOs face major challenges in 2023 when defending against threats coming from unmanaged devices, used by third-party service providers, or employee personal devices (BYOD) to access SaaS or corporate web applications. Those attacks have many faces, including stealing sensitive… Cloud ★★★
silicon.fr.webp 2023-03-09 10:08:17 Retex : pourquoi la Cnav développe son cloud privé (lien direct) Depuis 2018, la Cnav déploie un cloud privé développé en interne et qui va évoluer vers davantage de services PaaS, la gestion de conteneurs et une offre "infrastructure as a code". Explications avec Bruno Delibanti, directeur des opérations et services informatiques. Cloud ★★★
Blog.webp 2023-03-08 23:30:00 CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft) (lien direct) The ASEC (AhnLab Security Emergency response Center) analysis team has discovered that the CHM malware, which is assumed to have been created by the RedEyes threat group (also known as APT37, ScarCruft), is being distributed to Korean users. The team has confirmed that the command used in the “2.3. Persistence” stage of the RedEyes group’s M2RAT malware attack, which was reported back in February, has the same format as the command used in this attack. This information, as well as... Malware Threat Cloud APT 37 ★★
DarkReading.webp 2023-03-08 22:24:00 Edgeless Systems Raises $5M to Advance Confidential Computing (lien direct) Confidential computing will revolutionize cloud security in the decade to come and has become a top C-level priority for industry leaders such as Google, Intel and Microsoft. Edgeless Systems is leading these advancements to ensure all data is always encrypted. Guideline Cloud ★★
The_Hackers_News.webp 2023-03-08 22:00:00 Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks (lien direct) A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to code execution on targeted systems. The flaws, tracked as CVE-2023-27898 and CVE-2023-27905, impact the Jenkins server and Update Center, and have been collectively christened CorePlague by cloud security firm Aqua. All versions of Jenkins versions prior to 2.319.2 are Guideline Cloud ★★
CVE.webp 2023-03-08 15:15:10 CVE-2023-26261 (lien direct) In UBIKA WAAP Gateway/Cloud through 6.10, a blind XPath injection leads to an authentication bypass by stealing the session of another connected user. The fixed versions are WAAP Gateway & Cloud 6.11.0 and 6.5.6-patch15. Guideline Cloud
DarkReading.webp 2023-03-08 15:10:00 Surge in Cloud Adoption Means a Greater Data Attack Surface for Healthcare and Financial Services (lien direct) Organizations in both industries are falling short when addressing new challenges to protect data in the cloud, finds Blancco report. Cloud ★★
DarkReading.webp 2023-03-08 15:00:00 Rising Public Cloud Adoption Is Accelerating Shadow Data Risks (lien direct) Using a risk-based approach to deal with policy violations and continuous compliance monitoring will help avoid data exposures and fines. Cloud ★★
globalsecuritymag.webp 2023-03-08 10:52:18 SentinelOne and Wiz announce exclusive partnership to deliver end to end cloud security (lien direct) SentinelOne and Wiz announce exclusive partnership to deliver end to end cloud security Leading cybersecurity companies join forces to enhance customers' cloud security - Business News Guideline Cloud ★★★
TechRepublic.webp 2023-03-07 16:51:12 CrowdStrike: Attackers focusing on cloud exploits, data theft (lien direct) >CrowdStrike's new threat report sees a big increase in data theft activity, as attackers move away from ransomware and other malware attacks, as defense gets better, and the value of data increases. Ransomware Malware Threat Cloud ★★
DarkReading.webp 2023-03-07 16:07:22 Remcos RAT Spyware Scurries Into Machines via Cloud Servers (lien direct) Attackers use phishing emails that appear to come from reputable organizations, dropping the payload using public cloud servers and an old Windows UAC bypass technique. Cloud ★★★
InfoSecurityMag.webp 2023-03-07 13:15:00 Just 10% of Firms Can Resolve Cloud Threats in an Hour (lien direct) Tool bloat is making it harder to detect and contain attacks Tool Cloud ★★
silicon.fr.webp 2023-03-07 12:37:23 Comment Nexity a engagé sa transformation cloud (lien direct) Le groupe immobilier s'est engagé dans une migration complète de son infrastructure dans le cloud en plusieurs étapes. Témoignage de Laurent Dirson, son directeur des solutions business et des technologies. Cloud ★★
PaloAlto.webp 2023-03-07 11:00:17 Cloud-Native Security Survey: Patterns and Tipping Points in New Report (lien direct) >2023 Cloud security survey offers new data highlighting challenges faced by cloud security professionals and posing risks to application development security. Cloud ★★
AlienVault.webp 2023-03-07 11:00:00 An assessment of ransomware distribution on darknet markets (lien direct) Ransomware is a form of malicious software (malware) that restricts access to computer files, systems, or networks until a ransom is paid. In essence, an offender creates or purchases ransomware, then uses it to infect the target system. Ransomware is distributed in several ways including, but not limited to, malicious website links, infected USB drives, and phishing emails. Once infected, the offender encrypts the device and demands payment for the decryption key. Figure 1 provides a simplistic overview of the ransomware timeline. Figure 1. Ransomware timeline. how ransomware works The earliest recorded case of ransomware was the AIDS Trojan, which was released in the late 1980s. Now, in 2023, ransomware is considered the greatest cybersecurity threat due to the frequency and severity of attacks. In 2021, the Internet Crimes Complaint Center received over 3,000 ransomware reports totaling $49.2 million in losses. These attacks are especially problematic from a national security perspective since hackers aggressively target critical infrastructure such as the healthcare industry, energy sector, and government institutions. If ransomware has been around for over 40 years, why is it now increasing in popularity? We argue the increase in ransomware attacks can be attributed to the availability of ransomware sold on darknet markets. Darknet markets Darknet markets provide a platform for cyber-criminals to buy, sell, and trade illicit goods and services. In a study funded by the Department of Homeland Security, Howell and Maimon found darknet markets generate millions of dollars in revenue selling stolen data products including the malicious software used to infect devices and steal personal identifying information. The University of South Florida’s (USF) Cybercrime Interdisciplinary Behavioral Research (CIBR) sought to expand upon this research. To do this, we extracted cyber-intelligence from darknet markets to provide a threat assessment of ransomware distribution. This report presents an overview of the key findings and the corresponding implications. Threat assessment While drugs remain the hottest commodity on darknet markets, our threat intelligence team observed a rise in ransomware (and other hacking services).  The study was conducted from November 2022-February 2023. We began by searching Tor for darknet markets advertising illicit products. In total, we identified 50 active markets: this is more than all prior studies. We then searched for vendors advertising ransomware across these markets, identifying 41 vendors actively selling ransomware products. The number of markets and vendors highlight the availability of ransomware and ease of access. Interestingly, we find more markets than vendors. Ransomware vendors advertise their products on multiple illicit markets, which increases vendor revenue and market resiliency. If one market is taken offline (by law enforcement or hackers), customers can shop with the same vendor across multiple store fronts. The 41 identified vendors advertised 98 unique ransomware products. This too shows the accessibility of various forms of ransomware readily available for purchase. We extracted the product description, price, and transaction information into a structured database file for analysis. In total, we identified 504 successful transactions (within a 4-month period) with prices ranging from $1-$470. On average, ransomware so Ransomware Threat Cloud ★★
no_ico.webp 2023-03-06 19:33:22 An Essential Guide To Threat Modeling Cloud Platform (lien direct) Threat modeling is a proactive method for locating the points of entry on a system’s attack surface, listing the threats, and putting security measures in place. Its main objective is to guard against security lapses. An illustration of a system’s architecture has always served as the basis for this. Threat modeling technically is not exclusive […] Threat Cloud ★★★
DarkReading.webp 2023-03-06 18:10:00 SANS Institute Partners With Google to Launch Cloud Diversity Academy (lien direct) Pas de details / No more details Cloud ★★★
The_Hackers_News.webp 2023-03-06 17:21:00 Experts Reveal Google Cloud Platform\'s Blind Spot for Data Exfiltration Attacks (lien direct) Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new research has found. "Unfortunately, GCP does not provide the level of visibility in its storage logs that is needed to allow any effective forensic investigation, making organizations blind to potential data exfiltration attacks," cloud incident response Cloud ★★★
Last update at: 2024-07-05 20:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter