Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-05-30 02:45:40 |
Comment l'IA a attrapé APT41 exploitant les vulnérabilités How AI Caught APT41 Exploiting Vulnerabilities (lien direct) |
En analysant comment le groupe cybercriminal APT41 a exploité une vulnérabilité à jour zéro, nous montrons comment DarkTrace \\ a Ai a détecté et étudié la menace immédiatement.
Analyzing how the cyber-criminal group APT41 exploited a zero-day vulnerability, we show how Darktrace\'s AI detected and investigated the threat immediately. |
Vulnerability
Threat
|
APT 41
|
★★★
|
|
2024-05-10 23:55:48 |
Les cyberattaques d'inspiration hafnium neutralisés ont neutralisés |Darktrace AI Neutralized Hafnium-Inspired Cyber-Attacks | Darktrace (lien direct) |
Apprenez de ce scénario réel où DarkTrace a détecté une vulnérabilité proxylogon et a pris des mesures pour protéger les serveurs d'échange.Lisez la suite ici.
Learn from this real-life scenario where Darktrace detected a ProxyLogon vulnerability and took action to protect Exchange servers. Read more here. |
Vulnerability
|
|
★★★
|
|
2023-10-26 13:08:32 |
If you build it, they will come: Cyber-criminals are exploiting Latin America\\'s new digital economy (lien direct) |
In light of Latin America\'s rapid digitalization and increasingly lucrative virtual assets, existing security vulnerabilities that were not significant several years or even months ago are now being exploited by cyber-criminals.
In light of Latin America\'s rapid digitalization and increasingly lucrative virtual assets, existing security vulnerabilities that were not significant several years or even months ago are now being exploited by cyber-criminals. |
Vulnerability
|
|
★★
|
|
2023-10-26 13:08:32 |
Exploring a crypto-mining campaign which used the Log4j vulnerability (lien direct) |
This blog analyzes a campaign-like pattern detected by Darktrace across multiple customers and industries which used the Log4j vulnerability to exploit compromised systems for crypto-mining, highlighting the multi-stage attack from initial C2 contact through payload retrieval to successful crypto-miner installation.
This blog analyzes a campaign-like pattern detected by Darktrace across multiple customers and industries which used the Log4j vulnerability to exploit compromised systems for crypto-mining, highlighting the multi-stage attack from initial C2 contact through payload retrieval to successful crypto-miner installation. |
Vulnerability
Threat
|
|
★★
|
|
2023-06-05 11:01:52 |
Détection et orientation pour la confluence CVE-2022-26134 Zero-Day Detection and guidance for the Confluence CVE-2022-26134 zero-Day (lien direct) |
Ce blog explore la dernière vulnérabilité affectant l'Atlassian Confluence Suite en juin 2022. Il contient des conseils généraux et un exemple où Darktrace a détecté et a répondu à une exploitation des clients de ce CVE au cours du premier week-end d'attaques dans le monde.Cette attaque faisait partie d'une activité d'exploitation cryptographique plus large.
This blog explores the latest vulnerability affecting the Atlassian Confluence suite in June 2022. It contains general guidance and an instance where Darktrace both detected and responded to a customer-facing exploitation of this CVE during the first weekend of in-the-wild attacks. This attack was part of wider crypto-mining activity. |
Vulnerability
|
|
★★★
|
|
2021-11-08 09:00:00 |
GitLab vulnerability exploit detected by AI (lien direct) |
With over 30,000 unpatched GitLab servers remaining unprotected against the vulnerability tracked as CVE-2021-22205, Darktraceâs AI has detected several compromises that have resulted in crypto-currency mining. This blog explores how Cyber AI Analyst connected the dots and revealed the full extent of the intrusion in different organizations. |
Vulnerability
|
|
|
|
2021-08-26 09:00:00 |
Protecting critical infrastructure: Mapping and patching CVEs is not enough for robust defense (lien direct) |
Mapping and patching common vulnerabilities and exposure (CVEs) is not enough to achieve truly robust defense. This blog discusses the limits of vulnerability tracking and how self-learning technology can help achieve the goals of Bidenâs National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. |
Vulnerability
Patching
|
|
|
|
2020-12-17 09:00:00 |
ZeroLogon exploit detected within 24 hours of vulnerability notice (lien direct) |
An attack using the ZeroLogon exploit code was identified by Darktrace less than 24 hours after a CISA's public announcement. This blog explores the consequences of a ZeroLogon attack and how Darktrace AI managed to detect and investigate the threat. |
Vulnerability
|
|
|
|
2020-07-08 09:00:00 |
Speed of weaponization: From vulnerability disclosure to crypto-mining campaign in a week (lien direct) |
Darktrace recently detected a series of crypto-mining campaigns in its customers just a week after SaltStack revealed a vulnerability. This blog details the initial infection, payload execution and command and control, describing how AI identified the threat in real time. |
Vulnerability
Threat
|
|
|
|
2020-04-02 09:00:00 |
Catching APT41 exploiting a zero-day vulnerability (lien direct) |
This blog looks at how the cyber-criminal group APT41 exploited a zero-day vulnerability, and examines how Darktrace's AI detected and investigated the threat at machine speed. |
Vulnerability
Threat
Guideline
|
APT 41
|
|
|
2020-01-27 09:00:00 |
Using AI to detect a bitcoin mining campaign leveraging Citrix Netscaler vulnerabilities (lien direct) |
Recently discovered Citrix vulnerability strengthens the case for Autonomous Response and its proven ability to prevent novel attacks. |
Vulnerability
|
|
|