Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-11-30 10:30:00 |
Threat Hunting: Improving Bot Detection in Enterprise SD-WANs (lien direct) |
How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.
|
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-11-29 18:20:00 |
Overall Volume of Thanksgiving Weekend Malware Attacks Lower This Year (lien direct) |
But ransomware attacks go through the roof, new threat data from SonicWall shows. |
Ransomware
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-11-02 17:00:00 |
Worst Malware and Threat Actors of 2018 (lien direct) |
Two reports call out the most serious malware attacks and attackers of the year (so far). |
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-10-24 14:30:00 |
Tackling Supply Chain Threats (lien direct) |
Vendor-supplied malware is a threat that has been largely overlooked. That has to change. |
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-10-17 10:30:00 |
The Three Dimensions of the Threat Intelligence Scale Problem (lien direct) |
To succeed, organizations must be empowered to reduce their attack surface and staff overload so they can get more out of their existing firewall and threat intelligence investments. |
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-09-26 16:35:00 |
VPNFilter Evolving to Be a More Dangerous Threat (lien direct) |
VPNFilter malware is adding capabilities to become a more fully-featured tool for threat actors. |
Malware
Tool
Threat
|
VPNFilter
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-08-24 09:30:00 |
Modular Downloaders Could Pose New Threat for Enterprises (lien direct) |
Proofpoint says it has recently discovered two downloaders that let attackers modify malware after it has been installed on a system. |
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-07-10 18:10:00 |
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign (lien direct) |
Threat actor Magecart has infiltrated over 800 e-commerce sites with card skimming software installed on third-party software components, RiskIQ says. |
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-07-02 13:15:00 |
\'Clipboard Hijacker\' Malware Builds on Cryptocurrency Threat (lien direct) |
Clipboard Hijackers are not a new threat, but this one shows attackers are getting more advanced.
|
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-06-29 10:30:00 |
Why Sharing Intelligence Makes Everyone Safer (lien direct) |
Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies. |
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2018-03-07 16:13:00 |
Researchers Defeat Android OEMs\' Security Mitigations (lien direct) |
At Black Hat Asia, two security experts will bypass security improvements added to Android by equipment manufacturers. |
Threat
|
|
★★★
|