Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-13 14:15:00 |
\'SimBad\': Android Adware Hits 210 Apps with 150M Downloads (lien direct) |
Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-12 17:55:00 |
Citrix Breach Underscores Password Perils (lien direct) |
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-12 17:10:00 |
(Déjà vu) Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack (lien direct) |
Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-12 13:00:00 |
Cybercriminals Think Small to Earn Big (lien direct) |
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-08 17:30:00 |
Citrix Hacked by \'International Cybercriminals\' (lien direct) |
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-07 18:10:00 |
Phishing Attacks Evolve as Detection & Response Capabilities Improve (lien direct) |
Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-07 15:50:00 |
IoT Anomaly Detection 101: Data Science to Predict the Unexpected (lien direct) |
Yes! You can predict the chance of a mechanical failure or security breach before it happens . Here's how. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-07 10:30:00 |
4 Ways At-Work Apps Are Vulnerable to Attack (lien direct) |
Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.
|
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-06 16:30:00 |
New Threat Group Using Old Technique to Run Custom Malware (lien direct) |
Whitefly is exploiting DLL hijacking with considerable success against organizations since at least 2017, Symantec says. |
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-05 14:15:00 |
Lazarus Research Highlights Threat from North Korea (lien direct) |
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen. |
Threat
Medical
|
APT 38
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-05 10:30:00 |
Artificial Intelligence: The Terminator of Malware (lien direct) |
Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future? |
Malware
Guideline
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-05 07:00:00 |
Incident Response: Having a Plan Isn\'t Enough (lien direct) |
Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-03-01 07:30:00 |
Encryption Offers Safe Haven for Criminals and Malware (lien direct) |
The same encryption that secures private enterprise data also provides security to malware authors and criminal networks. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-28 13:35:00 |
(Déjà vu) Data Leak Exposes Dow Jones Watchlist Database (lien direct) |
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-28 13:35:00 |
(Déjà vu) Dow Jones Leak Exposes Watchlist Database (lien direct) |
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-27 16:45:00 |
Persistent Attackers Rarely Use Bespoke Malware (lien direct) |
Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools. |
Malware
Threat
|
APT 27
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-26 19:00:00 |
Researchers Build Framework for Browser-Based Botnets (lien direct) |
HTML5 used to build persistent malware on victims' computers. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-26 16:40:00 |
Social Media Platforms Double as Major Malware Distribution Centers (lien direct) |
Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-26 14:46:00 |
\'Cloudborne\': Bare-Metal Cloud Servers Vulnerable to Attack (lien direct) |
Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-25 14:00:00 |
Russian Hacker Pleads Guilty to Bank Fraud (lien direct) |
The hacker ran a botnet that spread 'NeverQuest' malware for three years and collected millions of banking credentials. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-25 13:15:00 |
(Déjà vu) TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised (lien direct) |
Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-25 13:15:00 |
(Déjà vu) TurboTax Hit with Cyberattack, Tax Returns Compromised (lien direct) |
Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-22 15:15:00 |
Lessons From the War on Malicious Mobile Apps (lien direct) |
Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-22 15:10:00 |
New Malware Campaign Targets Job Seekers (lien direct) |
LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages. |
Malware
Threat
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-22 11:20:00 |
New Legislation Builds on California Data Breach Law (lien direct) |
This bill requires businesses to notify consumers of compromised passport numbers and biometric data. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-21 17:50:00 |
Attack Campaign Experiments with Rapid Changes in Email Lure Content (lien direct) |
It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-21 14:30:00 |
Why Cybersecurity Burnout Is Real (and What to Do About It) (lien direct) |
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-21 13:20:00 |
Cyber Extortionists Can Earn $360,000 a Year (lien direct) |
Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-20 15:30:00 |
POS Vendor Announces January Data Breach (lien direct) |
More than 120 restaurants were affected by an incident that exposed customer credit card information. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-19 11:25:00 |
Breach in Stanford System Exposes Student Records (lien direct) |
A wide variety of data was visible through the vulnerability. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-14 15:45:00 |
Coffee Meets Bagel Confirms Hack on Valentine\'s Day (lien direct) |
The dating app says users' account data may have been obtained by an unauthorized party. |
Hack
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-14 09:00:00 |
Learn New Malware-Fighting Tools & Techniques at Black Hat Asia (lien direct) |
There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos. |
Malware
Tool
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-13 18:10:00 |
2018 Was Second-Most Active Year for Data Breaches (lien direct) |
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-13 17:30:00 |
Windows Executable Masks Mac Malware (lien direct) |
A new strain of MacOS malware hides inside a Windows executable to avoid detection. |
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-12 17:55:00 |
Up to 100,000 Reported Affected in Landmark White Data Breach (lien direct) |
Australian property valuation firm Landmark White exposed files containing personal data and property valuation details. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-11 20:30:00 |
Client-Side DNS Attack Emerges From Academic Research (lien direct) |
|
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-11 16:00:00 |
New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices (lien direct) |
Adantium, developed by Google, brings communication encryption to bear on storage security. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-11 15:15:00 |
OkCupid Denies Data Breach Amid Account Hack Complaints (lien direct) |
Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords. |
Data Breach
Hack
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-08 14:00:00 |
New Zombie \'POODLE\' Attack Bred From TLS Flaw (lien direct) |
Citrix issues update for encryption weakness dogging the popular security protocol. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-08 13:45:00 |
Malware Campaign Hides Ransomware in Super Mario Wrapper (lien direct) |
A newly discovered malware campaign uses steganography to hide GandCrab in a seemingly innocent Mario image. |
Ransomware
Malware
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-07 18:15:00 |
Ransomware Attack Via MSP Locks Customers Out of Systems (lien direct) |
Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP. |
Ransomware
Tool
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-07 10:30:00 |
When 911 Goes Down: Why Voice Network Security Must Be a Priority (lien direct) |
When there's a DDoS attack against your voice network, are you ready to fight against it? |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-02-01 13:45:00 |
Nest Hack Leaves Homeowner Sleepless in Chicago (lien direct) |
A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home. |
Hack
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-31 13:50:00 |
Airbus Employee Info Exposed in Data Breach (lien direct) |
Few details as yet on a cyberattack that hit Airbus' commercial aircraft business. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-30 18:45:00 |
Justice Dept. Alerting Victims of North Korean Botnet Infections (lien direct) |
US officials disrupt North Korea's Joanap attack infrastructure. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-30 17:29:00 |
Rubrik Data Leak is Another Cloud Misconfiguration Horror Story (lien direct) |
A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-30 16:55:00 |
Massive DDoS Attack Generates 500 Million Packets per Second (lien direct) |
January 10 torrent involved nearly four times as many packets as last year's huge attack on GitHub, says Imperva. |
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-30 12:00:00 |
Discover Issues New Cards Following Data Breach (lien direct) |
The credit card company reports Discover's card systems were not involved in the breach, discovered in August 2018. |
Data Breach
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-28 16:00:00 |
US Law Enforcement Shuts Down Massive Marketplace for Compromised Servers (lien direct) |
At its peak, xDedic listed over 70,000 owned servers that buyers could purchase for prices starting as low as $6 each.
|
|
|
|
![DarkReading.webp](./Ressources/img/DarkReading.webp) |
2019-01-24 16:40:00 |
Database of 24 Million Mortgage, Loan Records Left Exposed Online (lien direct) |
Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say. |
|
|
|