What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2023-10-12 10:00:00 Applications financières panafricaines cryptage de fuite, clés d'authentification
Pan-African Financial Apps Leak Encryption, Authentication Keys
(lien direct)
Les applications de crypto-monnaie étaient le risque le plus élevé pour exposer des informations sensibles, selon une étude d'ingénierie inverse.
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.
Studies ★★
Blog.webp 2023-10-11 16:22:40 ALERTE NOUVELLE: L'étude révèle que les cabinets d'avocats ciblés - Cloud UK les exhorte également à consolider la cyber-hygiène
News alert: Study finds law firms targeted - ALSO Cloud UK urges them to shore up cyber hygiene
(lien direct)
Emmen, Suisse, 11 octobre 2023 & # 8212;Des recherches récentes du National Cyber Security Center (NCSC) ont révélé Les cabinets d'avocats britanniques sont des objectifs de plus en plus attrayants Pour les cybercriminels intéressés à voler et à exploiter les données des clients. HybridLe travail a été cité comme a & # 8230; (plus…)
Emmen, Switzerland, Oct. 11, 2023 — Recent research by the National Cyber Security Centre (NCSC) has found UK law firms are increasingly appealing targets for cybercriminals interested in stealing and exploiting client data. Hybrid working has been cited as a … (more…)
Studies Cloud ★★
AlienVault.webp 2023-10-11 10:00:00 Le rôle de 5G \\ dans la télémédecine: l'avenir est maintenant
5G\\'s role in telemedicine: The future is now
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Healthcare and technology have always gone hand in hand. Telemedicine, which lets you talk to doctors without visiting them in person, is a great example. A few years back, it might have sounded like science fiction.  But today, it\'s a regular part of many people\'s lives. In fact, data shows that 80% of people have used telemedical services at least once in their lives. And now 5G is making the process even more efficient.  Most of us know 5G as just a faster way to use the internet on our phones. But for healthcare, it\'s a lifesaver. With 5G, doctors can diagnose patients in real-time, no matter how far apart they are. It could even make remote surgeries a reality. And the best part? 5G can help everyone, not just people in big cities. It has the power to bring top-notch healthcare to places that were left out before. As we move forward, it\'s exciting to think about how 5G will change healthcare for all of us.  Continue reading to find out more. How 5G is changing telemedicine Before 5G, telemedicine was already useful, but it had its limits. Sometimes, the internet connection might be slow, making video calls blurry or delayed. This could be a problem, especially in critical situations where every second counts. But with 5G, things are changing. Here\'s how: Faster video calls. With 5G, video calls between patients and doctors can be crystal clear and smooth. This means better communication and understanding, which is vital in healthcare. Real-time data. Doctors can now get real-time data about a patient\'s health. For example, if a patient wears a heart monitor, the doctor can see the results instantly with 5G. This helps in making quick decisions. Remote surgeries. This might sound like it’s out of a Star Trek episode, but it\'s becoming a reality. With 5G\'s speed, a surgeon in one city could guide surgery in another city. This can be a game-changer, especially in places where there aren\'t many specialists. Reaching more people. With 5G, even people in remote areas can access telemedicine. This means they can get the medical help they need without traveling long distances. How 5G helps with remote patient monitoring Remote patient monitoring is like having a mini-doctor\'s office in your home. It\'s a way for doctors to keep an eye on your health without you having to visit them in person.  Here\'s how it works and why it\'s making a big difference: Tools and devices  These aren\'t just ordinary gadgets. Devices like heart rate monitors, blood pressure cuffs, and even glucose meters have been upgraded for the digital age.  When you use them at home, they don\'t just give readings; they send this data over the internet straight to your doctor\'s system for remote patient monitoring. This means your doctor gets a clear, real-time picture of your health without you having to jot down or remember numbers. Less visits, same care  The traditional model of healthcare often meant waiting in a clinic, even for minor check-ups. With remote monitoring, many of these visits are no longer necessary. You can go about your day, and the devices will do the work. The elderly stand to benefit the most from this, as well as those with mobili Studies Medical ★★★
ProofPoint.webp 2023-10-11 05:00:00 Le deuxième rapport annuel sur le Ponemon Institute révèle que les deux tiers des organisations de santé interrogées ont une perturbation des soins aux patients en raison des cyberattaques
Second Annual Ponemon Institute Report Finds That Two-Thirds of Healthcare Organizations Surveyed Experienced Disruption to Patient Care Due to Cyber Attacks
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Healthcare and technology have always gone hand in hand. Telemedicine, which lets you talk to doctors without visiting them in person, is a great example. A few years back, it might have sounded like science fiction.  But today, it\'s a regular part of many people\'s lives. In fact, data shows that 80% of people have used telemedical services at least once in their lives. And now 5G is making the process even more efficient.  Most of us know 5G as just a faster way to use the internet on our phones. But for healthcare, it\'s a lifesaver. With 5G, doctors can diagnose patients in real-time, no matter how far apart they are. It could even make remote surgeries a reality. And the best part? 5G can help everyone, not just people in big cities. It has the power to bring top-notch healthcare to places that were left out before. As we move forward, it\'s exciting to think about how 5G will change healthcare for all of us.  Continue reading to find out more. How 5G is changing telemedicine Before 5G, telemedicine was already useful, but it had its limits. Sometimes, the internet connection might be slow, making video calls blurry or delayed. This could be a problem, especially in critical situations where every second counts. But with 5G, things are changing. Here\'s how: Faster video calls. With 5G, video calls between patients and doctors can be crystal clear and smooth. This means better communication and understanding, which is vital in healthcare. Real-time data. Doctors can now get real-time data about a patient\'s health. For example, if a patient wears a heart monitor, the doctor can see the results instantly with 5G. This helps in making quick decisions. Remote surgeries. This might sound like it’s out of a Star Trek episode, but it\'s becoming a reality. With 5G\'s speed, a surgeon in one city could guide surgery in another city. This can be a game-changer, especially in places where there aren\'t many specialists. Reaching more people. With 5G, even people in remote areas can access telemedicine. This means they can get the medical help they need without traveling long distances. How 5G helps with remote patient monitoring Remote patient monitoring is like having a mini-doctor\'s office in your home. It\'s a way for doctors to keep an eye on your health without you having to visit them in person.  Here\'s how it works and why it\'s making a big difference: Tools and devices  These aren\'t just ordinary gadgets. Devices like heart rate monitors, blood pressure cuffs, and even glucose meters have been upgraded for the digital age.  When you use them at home, they don\'t just give readings; they send this data over the internet straight to your doctor\'s system for remote patient monitoring. This means your doctor gets a clear, real-time picture of your health without you having to jot down or remember numbers. Less visits, same care  The traditional model of healthcare often meant waiting in a clinic, even for minor check-ups. With remote monitoring, many of these visits are no longer necessary. You can go about your day, and the devices will do the work. The elderly stand to benefit the most from this, as well as those with mobili Studies ★★★★
globalsecuritymag.webp 2023-10-10 16:02:37 Cybersécurité : que faire contre la menace intérieure ? Almond publie la première édition de son rapport " Insider Threat " (lien direct) Cybersécurité : que faire contre la menace intérieure ? Almond publie la première édition de son rapport " Insider Threat " - Investigations Threat Studies ★★★★
knowbe4.webp 2023-10-10 12:22:31 74% des PDG préoccupés par la capacité de leur organisation à se protéger contre les cyberattaques, malgré le fait que la cybersécurité
74% of CEOs Concerned About Their Organization\\'s Ability to Protect Against Cyber Attacks, Despite Seeing Cybersecurity as Critical
(lien direct)
74% des PDG préoccupés par la capacité de leur organisation à protéger contre les cyberattaques, bien que la cybersécurité soit considérée comme critique Selon le récent Rapport du PDG cyber-résilient publié par les services et des services et des services etConsulting Agency Accenture , 74% des PDG ont exprimé leurs préoccupations concernant leurs organisations \\ 'à protéger leurs entreprises contre les cyberattaques.Ceci malgré le fait que 96% des PDG reconnaissent l'importance de la cybersécurité pour la croissance et la stabilité de leurs organisations.
74% of CEOs Concerned About their Organization\'s Ability to Protect Against Cyberattacks, Despite Seeing Cybersecurity as Critical According to the recent The Cyber-Resilient CEO report released by IT services and consulting agency Accenture, a staggering 74% of CEOs have expressed concerns about their organizations\' ability to protect their businesses from cyber attacks. This is despite the fact that 96% of CEOs acknowledge the importance of cybersecurity for the growth and stability of their organizations.
Studies ★★★★
globalsecuritymag.webp 2023-10-10 07:21:29 Rapport Hiscox sur la gestion des cyber-risques 2023 – 7e édition (lien direct) Rapport Hiscox sur la gestion des cyber-risques 2023 – 7e édition 36 % des entreprises de moins de 10 salariés ont été touchées par une cyberattaque sur les 12 derniers mois Le risque cyber se maintient à un niveau élevé, même pour les petites structures, mais la réponse des entreprises montre des signes encourageants. - Investigations Studies ★★★★
ProofPoint.webp 2023-10-10 07:16:32 Au-delà du statu quo, partie 1: le rôle vital des menaces de renseignement dans la sensibilisation à la sécurité
Beyond the Status Quo, Part 1: The Vital Role Threat Intelligence Plays in Security Awareness Education
(lien direct)
Welcome to the first installment of a three-part blog series that is focused on how to inspire engagement in security awareness for both users and practitioners. It will also explore creative techniques you can use to build a security culture that go beyond traditional security awareness training.  Cybersecurity Awareness Month is an excellent time to rejuvenate your security awareness program. But how can you sustain the momentum of Cybersecurity Awareness Month beyond October? Try adding threat intelligence to your program. It can personalize and invigorate your curriculum for your users.  Integrating threat intelligence into security awareness seems intuitive-and many practitioners claim to do it. But data suggests otherwise. Research Proofpoint conducted for our 2023 State of the Phish report found that while 75% of businesses faced business email compromise (BEC) attacks, a mere 31% trained their users about this threat. This indicates that while many businesses are aware of emerging threats, they struggle to weave this information into their training modules.   This blog post delves into best practices for using threat intelligence to raise security awareness with users. It includes insights from a customer session we held during Proofpoint Wisdom 2023 entitled “Utilizing Threat Intel to Design a Program that Works.” During that session, I spoke with Andrew Munson, senior manager of information risk management and governance at McDonald\'s Corporation, and Shaun Holmberg, IT security analyst at Commercial Metals Corporation. Both provided insights into how they infuse threat intelligence into their global security awareness initiatives.  Understanding threat intelligence  Threat intelligence is the knowledge and analysis of cyber threats and vulnerabilities that can pose a risk to a business. This information includes details about the attack lifecycle, network architecture vulnerabilities and which users are being targeted. The intel should also provide details of the risk level or the consequential impact that a successful cyber attack may have on a business.   This information can be gathered from various sources. According to Shaun and Andrew, examples of optimal sources for intelligence are:  Research reports. These resources include, but are not limited to:   State of the Phish from Proofpoint  Verizon\'s Data Breach Investigations Report (DBIR)  FBI Internet Crime Report (Internet Crime Complaint Center)  Coalition\'s Cyber Claims Report  Security feeds. Proofpoint threat intelligence services, Rapid7 and Cyber Reasons are examples of providers of these feeds.  Incident reports from products. These reports include Proofpoint Targeted Attack Protection reports, Proofpoint Closed Loop Email Analysis (CLEAR) and other reports related to the penetration testing of a company\'s infrastructure.   Why is threat intelligence crucial for a security awareness program? Let\'s dive deeper into this subject using insights from the recent discussion with Andrew and Shaun.  Making threat intelligence actionable  At McDonald\'s, Andrew works with departments across the globe. Each region has its own requirements and is targeted with threats specific to an office. This is where working with a resource like the Proofpoint threat intelligence service team can create significant benefits for security teams.   Andrew described how working with our team gives him an advantage. He said the Proofpoint threat intelligence service team can analyze data across the globe to correlate attacks that may be affecting a single region. For example, they can recognize a targeted attack specific to Germany, which differs from an active attack they\'ve identified targeting Austria.   Andrew said he uses this data to build separate simulations that mimic the active attack for each region and launches an auto-enrollment training session tuned to recognizing the attack indicators. He can also provide resources like notifications or informative newsletters, all within the region\'s native l Ransomware Data Breach Vulnerability Threat Studies ★★
globalsecuritymag.webp 2023-10-09 12:19:59 Les recherches Ivanti montrent que 1/3 des collaborateurs pense que leurs actions n\'impactent pas la sécurité de leur entreprise (lien direct) Les recherches Ivanti montrent que 1/3 des collaborateurs pense que leurs actions n'impactent pas la sécurité de leur entreprise. Le rapport précise qu'une cybersécurité d'entreprise descendante de type " taille unique " ne tient pas compte des risques spécifiques liés à la situation géographique, à l'âge, au sexe et au rôle. - Investigations Studies ★★★
knowbe4.webp 2023-10-09 12:14:04 Le secteur de l'énergie connaît trois fois plus d'incidents de cybersécurité en technologie opérationnelle que toute autre industrie
Energy Sector Experiences Three Times More Operational Technology Cybersecurity Incidents Than Any Other Industry
(lien direct)
Le secteur de l'énergie subit trois fois plus d'incidents de cybersécurité que toute autre industrie Alors que les industries comme les services financiers et les soins de santé ont tendance à dominer les attaques informatiques, les tables sont tournées lors de la recherche de cyberattaques de technologie opérationnelle (OT) & # 8211;Et le secteur de l'énergie est le «gagnant» clair.
Energy Sector Experiences Three Times More OT Cybersecurity Incidents Than Any Other Industry While industries like financial services and healthcare tend to dominate in IT attacks, the tables are turned when looking at Operational Technology (OT) cyber attacks – and the energy sector is the clear “winner.”
Studies Industrial ★★★
RecordedFuture.webp 2023-10-06 18:45:00 Les victimes ont déclaré 2,7 milliards de dollars de pertes d'escroquerie sur les réseaux sociaux depuis 2021: FTC
Victims reported $2.7 billion in social media scam losses since 2021: FTC
(lien direct)
Les escroqueries sur les réseaux sociaux ont coûté des victimes qui ont déclaré des pertes pour la Federal Trade Commission 2,7 milliards de dollars depuis 2021 - probablement une «petite fraction» de l'argent total volé via des plateformes comme Facebook et Instagram. selon la FTC , une personne sur quatre quiDes pertes signalées au réseau de sentinelles de consommation de l'agence \\ depuis 2021 ont déclaré que le
Social media scams have cost victims who reported losses to the Federal Trade Commission $2.7 billion since 2021 - likely a “small fraction” of the total money stolen via platforms like Facebook and Instagram. According to the FTC, one in four people who reported losses to the agency\'s Consumer Sentinel Network since 2021 said the
Studies ★★★
RecordedFuture.webp 2023-10-06 17:07:00 Ukraine, Israël, Corée du Sud Liste des pays les plus ciblés pour les cyberattaques
Ukraine, Israel, South Korea top list of most-targeted countries for cyberattacks
(lien direct)
Plus de 120 pays ont fait face à des cyberattaques au cours de la dernière année, avec l'Ukraine, Israël, la Corée du Sud et Taiwan en tête de la liste des pays les plus ciblés, selon un nouveau rapport de Microsoft.Les résultats font partie de Microsoft \'s Rapport de défense numérique 2023 2023 - qui a utilisé des troves des données de l'entreprise pour suivre les tendances de la cybersécurité entre
More than 120 countries faced cyberattacks over the last year, with Ukraine, Israel, South Korea and Taiwan topping the list of the most targeted countries, according to a new report from Microsoft. The findings are part of Microsoft\'s Digital Defense Report 2023 - which used troves of the company\'s data to track cybersecurity trends between
Studies ★★★
globalsecuritymag.webp 2023-10-05 13:46:00 Microsoft Digital Defense Report 2023 : Le monde entre dans une nouvelle ère de cybermenaces (lien direct) Microsoft Digital Defense Report 2023 : Le monde entre dans une nouvelle ère de cybermenaces - Investigations Studies ★★★★
globalsecuritymag.webp 2023-10-05 09:30:32 Cyber: anxiété numérique, 37% intimidé, 39% frustré par la sécurité en ligne
CYBER: Digital Anxiety, 37% Intimidated, 39% Frustrated with Online Security
(lien direct)
Les autres faits saillants incluent: • La moitié de la génération Z, qui devrait dépasser le quart de la main-d'œuvre d'ici 2025, utiliser les détails personnels dans les mots de passe, nettement plus que leurs homologues plus âgés • 63% des personnes disent qu'ils peuvent identifier les menaces de phishing • 36% des Américains et 28% des Britanniques ont été victimes de cybercriminaux Étude: 37% intimidé, 39% frustré par la sécurité en ligne mettant en évidence l'anxiété numérique Le rapport sur les nouvelles attitudes et comportements de la cybersécurité met en évidence les tendances prometteuses du paysage de la cybersécurité - rapports spéciaux / /
Other highlights include: • Half of Gen Z, expected to be over quarter of the workforce by 2025, use personal details in passwords, significantly more than their older counterparts • 63% of people say they can identify phishing threats • 36% of Americans and 28% of Brits have been victims of cybercrime STUDY: 37% Intimidated, 39% Frustrated with Online Security Highlighting Digital Anxiety New Cybersecurity Attitudes and Behaviours Report Highlights Promising Trends in the Cybersecurity Landscape - Special Reports /
Studies ★★★★
DarkReading.webp 2023-10-04 21:49:00 NOUVEAU ENQUÊTE MALWOREBYTES: Les consommateurs manquent de confiance dans la nouvelle technologie
New Malwarebytes Survey: Consumers Lack Trust in New Tech
(lien direct)
Les autres faits saillants incluent: • La moitié de la génération Z, qui devrait dépasser le quart de la main-d'œuvre d'ici 2025, utiliser les détails personnels dans les mots de passe, nettement plus que leurs homologues plus âgés • 63% des personnes disent qu'ils peuvent identifier les menaces de phishing • 36% des Américains et 28% des Britanniques ont été victimes de cybercriminaux Étude: 37% intimidé, 39% frustré par la sécurité en ligne mettant en évidence l'anxiété numérique Le rapport sur les nouvelles attitudes et comportements de la cybersécurité met en évidence les tendances prometteuses du paysage de la cybersécurité - rapports spéciaux / /
Other highlights include: • Half of Gen Z, expected to be over quarter of the workforce by 2025, use personal details in passwords, significantly more than their older counterparts • 63% of people say they can identify phishing threats • 36% of Americans and 28% of Brits have been victims of cybercrime STUDY: 37% Intimidated, 39% Frustrated with Online Security Highlighting Digital Anxiety New Cybersecurity Attitudes and Behaviours Report Highlights Promising Trends in the Cybersecurity Landscape - Special Reports /
Studies ★★★★
globalsecuritymag.webp 2023-10-04 08:22:55 Le phishing augmente comme le principal cybermenace à 53%
Phishing Surges as the Leading Cyber Threat at 53%
(lien direct)
Phishing augmente comme le principal cyber-menace à 53% - mise à jour malveillant / /
Phishing Surges as the Leading Cyber Threat at 53% - Malware Update /
Threat Studies ★★★★
globalsecuritymag.webp 2023-10-04 07:55:14 Le rapport WatchGuard Threat Lab établit que 95% des malwares sont diffusés via des connexions chiffrées et que le volume de malwares ciblant les endpoints est en baisse (lien direct) Le rapport WatchGuard Threat Lab établit que 95% des malwares sont diffusés via des connexions chiffrées et que le volume de malwares ciblant les endpoints est en baisse. Les principales conclusions de l'étude montrent également, entre autres, une augmentation des attaques par double extorsion de 72% par rapport au trimestre précédent et la hausse de l'exploitation de vulnérabilités logicielles anciennes par les cybercriminels. - Investigations Threat Studies ★★★★
kovrr.webp 2023-10-04 00:00:00 Fortune 1000 Cyber Risk Reportkovrrrr \\\'s Fortune 1000 Report tire des motifs de quantification innovante pour fournir aux entreprises une référence pour évaluer les fréquences relatives de cyber-risques et la gravité
Fortune 1000 Cyber Risk ReportKovrr\\\'s Fortune 1000 report leverages our innovative quantification models to provide companies with a benchmark for gauging relative cyber risk frequencies and severitiesRead More
(lien direct)
Executive SummaryThe growing rate of global cyber events, throughout all industries, has elevated cybersecurity governance to the forefront of corporate concern. Indeed, this rising prevalence spurred the US Securities and Exchange Commission (SEC) in July 2023 to mandate the disclosure of "material" cyber threats and incidents, albeit within a framework of somewhat ambiguous materiality definitions.  This report leverages Kovrr’s risk quantification models to highlight the likely occurrence and relative costs of “material” cyber incidents companies might experience in the coming year, potentially eliciting consequences significant enough for SEC disclosures. Ultimately, Kovrr aims to provide insights for those companies seeking a deeper understanding of the types of cyber events and their respective financial impacts that are most likely to be disclosed in the coming years.MethodologyThe results of this report were determined via a comprehensive benchmarking exercise, using the US Fortune 1000 companies as the sample set due to the companies\' diverse range of industries. Kovrr\'s models capture a detailed representation of each company\'s technological profile and simulate yearly cyber event scenarios tailored to each company’s exposure to risk. ‍The models reveal “material” incidents in the form of data breaches, extortions, interruptions, and service provider events1. This report defines materiality as an interruption incident lasting over one hour or an incident where confidential data is breached. Smaller, non-material incidents are grouped and modeled in aggregate.‍Kovrr’s models produce an assessment of the likely frequency and severity of cyber breaches experienced by Fortune 1000 companies, harnessing our industry insights from previously disclosed breaches, insurance claims data, and incidents that have not been publicly disclosed.----1Event incidents (data breaches, extortions, interruptions, and service provider events) are defined at the end of the report.‍Key FindingsCyber Risk Across All IndustriesThe Oil, Gas Extraction, and Mining sector exhibits the highest probability of experiencing a material cyber event, with a frequency of 0.82 events per year (or approximately one material event every 1.2 years). However, the anticipated financial impact remains relatively modest, with a median cost of $28m. In contrast, the Utilities and Infrastructure industry faces a cyber event frequency of 0.62 events per year and a substantial financial impact of $57.9m.Annual Cost ScenariosAverage Annual Loss (AAL), which combines event frequency and cost across the full range of possibilities, allows us to compare the overall risk between industries. The Finance and Real Estate industry has the highest AAL at $34.3m, owing to the substantial financial ramifications of infrequent but high-impact events. Conversely, the Construction industry has the lowest AAL at $7.3m , indicative of its relatively lower exposure to cyber risk.Event DriversThe cyber event types reviewed in this report were interruptions, third-party service provider incidents, extortion events, and data breaches. The report reveals that interruption events are prevalent across industries. Also notably, the Retail Trade industry faces an annual frequency of 0.47 for data breaches (or approximately one material incident every 2 years), while the Finance and Real Estate sector follows closely with 0.42, underscoring their heightened exposure to data-centric cyber incidents.Cost DriversHighly regulated industries, notably Finance and Retail Trade, record the highest median costs per cyber event, totaling $70.5M, due to their extensive accumulation of PII. Third-party liability, regulatory compliance, and productivity loss augment the financial impact. The report also breaks down these costs further according to event type.Secondary Loss ConsiderationsWhile the primary financial impact is evident almost immediately, secondary losses often extend widely Ransomware Data Breach Threat Studies ★★★
The_Hackers_News.webp 2023-10-03 17:22:00 Tendances de sécurité de l'API 2023 & # 8211;Les organisations ont-elles amélioré leur posture de sécurité?
API Security Trends 2023 – Have Organizations Improved their Security Posture?
(lien direct)
Les API, également connues sous le nom d'interfaces de programmation d'applications, servent de squelette d'applications logicielles modernes, permettant une communication transparente et un échange de données entre différents systèmes et plates-formes.Ils fournissent aux développeurs une interface pour interagir avec les services externes, leur permettant d'intégrer diverses fonctionnalités dans leurs propres applications. Cependant, cette dépendance accrue à l'égard de
APIs, also known as application programming interfaces, serve as the backbone of modern software applications, enabling seamless communication and data exchange between different systems and platforms. They provide developers with an interface to interact with external services, allowing them to integrate various functionalities into their own applications. However, this increased reliance on
Studies ★★★
itsecurityguru.webp 2023-10-03 15:00:40 L'état de cybersécurité: Cyber Skill Gap laisse une entreprise vulnérable aux attaques, révèle de nouvelles recherches
The State of Cybersecurity: Cyber skills gap leaves business vulnerable to attacks, new research reveals
(lien direct)
Isaca, la principale association professionnelle mondiale aidant les individus et les organisations dans leur quête de confiance numérique, lance aujourd'hui de nouvelles recherches sur l'état de la cybersécurité.La recherche révèle que les professionnels de la cybersécurité qui ont déclaré avoir subi une augmentation ou une diminution des attaques de cybersécurité par rapport à il y a un an, plus de la moitié (52%) [& # 8230;]
ISACA, the leading global professional association helping individuals and organisations in their pursuit of digital trust, today launches new research looking at the state of cybersecurity. The research finds that of the cybersecurity professionals who said they were experiencing an increase or decrease in cybersecurity attacks as compared to a year ago, over half (52%) […]
Studies ★★★★
globalsecuritymag.webp 2023-10-03 13:08:45 Les dirigeants, maillon faible de la cybersécurité ? 60% d\'entre eux plus enclins à cliquer sur des liens malveillants (lien direct) Les dirigeants, maillon faible de la cybersécurité ? 60% d'entre eux plus enclins à cliquer sur des liens malveillants explique SOSAFE Malgré le fait que 66% des cadres supérieurs français accordent plus d'attention à la cybersécurité qu'en 2022 - Investigations Studies ★★★
InfoSecurityMag.webp 2023-10-03 13:00:00 La chaîne d'approvisionnement en amont attaque le triple en un an
Upstream Supply Chain Attacks Triple in a Year
(lien direct)
Sonatype détecte plus de 245 000 forfaits malveillants
Sonatype detects over 245,000 malicious packages
Studies ★★★
InfoSecurityMag.webp 2023-10-03 12:00:00 La moitié des professionnels de la cybersécurité signalent une augmentation des cyberattaques
Half of Cybersecurity Professionals Report Increase in Cyber-Attacks
(lien direct)
De nouvelles recherches d'Isaca ont constaté que l'écart de compétences en cybersécurité contribue aux entreprises \\ 'la préparation à la cybersécurité
New research by ISACA has found that the cybersecurity skills gap is contributing to businesses\' cybersecurity preparedness
Studies ★★★
globalsecuritymag.webp 2023-10-03 09:22:54 Etude Kyndryl Cybersécurité : les grandes entreprises en excès de confiance ? (lien direct) Etude Kyndryl Cybersécurité : les grandes entreprises en excès de confiance ? - Points de Vue Studies ★★★★
globalsecuritymag.webp 2023-10-03 08:59:46 Les PME Européennes sont de plus en plus préoccupées par les cybermenaces depuis 12 mois, plus d\'un tiers admet avoir été victime d\'attaques. (lien direct) Les PME Européennes sont de plus en plus préoccupées par les cybermenaces depuis 12 mois, plus d'un tiers admet avoir été victime d'attaques, recherches menées par Sharp Europe - Investigations Studies ★★★
globalsecuritymag.webp 2023-10-03 08:49:53 La recherche Ivanti montre qu'un employé sur trois croit que leurs actions n'ont pas d'impact sur la sécurité de leur organisation
Ivanti Research Shows that One in Three Employees Believe Their Actions Don\\'t Impact Their Organization\\'s Security
(lien direct)
La recherche Ivanti montre qu'un employé sur trois croit que leurs actions n'ont pas d'impact sur la sécurité de leur organisation Le rapport détaille comment la cybersécurité de haut en bas et une taille unique ignore les risques uniques qui accompagnent la géographie, l'âge, le sexe et le rôle - rapports spéciaux
Ivanti Research Shows that One in Three Employees Believe Their Actions Don\'t Impact Their Organization\'s Security The report details how top-down, one-size-fits-all enterprise cybersecurity ignores the unique risks that accompany geography, age, gender, and role - Special Reports
Studies ★★★
InfoSecurityMag.webp 2023-10-03 08:30:00 Le cinquième des Britanniques soupçonnent qu'ils ont été surveillés par les employeurs
Fifth of Brits Suspect They\\'ve Been Monitored by Employers
(lien direct)
Le régulateur de la vie privée avertit les employés de rester dans la loi
Privacy regulator warns employees to stay within the law
Studies ★★★
globalsecuritymag.webp 2023-10-03 07:45:20 Trend Micro : Etat des attaques de ransomware au premier semestre 2023 (lien direct) Etat des attaques de ransomware au premier semestre 2023 par Trend Micro Les institutions américaines sont majoritairement prises pour cible par LockBit. • Le rapport de Trend Micro évalue le ratio d'attaque à une sur six. • Le volume de victimes de ransomware est en forte hausse : +47%. • LockBit, BlackCat et Clop sont les familles de ransonwares les plus actives.#Cybersecurité #Ransomware #LockBit - Investigations Ransomware Studies Prediction ★★★★
The_State_of_Security.webp 2023-10-03 03:30:24 Les principaux points à retenir du rapport d'identité du domaine 2023
Key Takeaways from the 2023 Domain Impersonation Report
(lien direct)
L'une des menaces les plus omniprésentes et inévitables sur Internet, l'identité du domaine peut être utilisée par les mauvais acteurs comme base pour un large éventail d'attaques.Les différentes manières dont les cybercriminels utilisent des domaines de look fluctuent souvent, et la première moitié de 2023 a illustré ce fait.Rester au sommet de la sécurité et ne pas être victime de ces attaques nécessite de savoir quels sont les dangers et de garder une trace des menaces susceptibles de monter.Le rapport d'identité du domaine 2023 de Fortra \\ explore les tendances récentes dans les domaines de lookalike, l'abus de domaine de haut niveau et le domaine des e-mails ...
One of the most pervasive and unavoidable threats on the internet, domain impersonation can be used by bad actors as the basis for a wide range of attacks. The various ways in which cybercriminals make use of lookalike domains often fluctuate, and the first half of 2023 has exemplified this fact. Staying on top of security and not falling victim to these attacks requires knowing what the dangers are and keeping track of the threats that are likely to spring up. Fortra\'s 2023 Domain Impersonation Report explores recent trends in lookalike domains, top-level domain abuse, and email domain...
Studies ★★★★
Blog.webp 2023-10-02 17:05:46 L'industrie cryptographique a perdu 685 millions de dollars au troisième trimestre 2023, 30% par le groupe Lazare
Crypto Industry Lost $685 Million in Q3 2023, 30% by Lazarus Group
(lien direct)
> Par waqas Rapport des pertes de crypto immunufi: T1 2023 voit les plus hautes pertes de l'année. Ceci est un article de HackRead.com Lire le post original: L'industrie cryptographique a perdu 685 millions de dollars au troisième trimestre 2023, 30% par le groupe Lazare
>By Waqas Immunefi Crypto Losses Report: Q3 2023 Sees Highest Losses of the Year. This is a post from HackRead.com Read the original post: Crypto Industry Lost $685 Million in Q3 2023, 30% by Lazarus Group
Studies APT 38 ★★★★
DarkReading.webp 2023-10-02 17:00:00 Quels défis DFIR le Moyen-Orient est-il confronté?
Which DFIR Challenges Does the Middle East Face?
(lien direct)
La demande de criminalistique numérique et de réponse aux incidents (DFIR) augmente au Moyen-Orient, selon un nouveau rapport IDC.L'automatisation est-elle la réponse?
Demand for digital forensics and incident response (DFIR) surges in the Middle East, a new IDC report finds. Is automation the answer?
Studies ★★★
Chercheur.webp 2023-10-02 16:40:47 NSA AI Security Center (lien direct) La NSA est commençant un nouveau centre de sécurité artificiel de l'intelligence: L'établissement de l'IA de sécurité a été. Nakasone a déclaré qu'il deviendrait un point focal de la NSA pour tirer parti des informations sur l'intelligence étrangère, contribuant à l'élaboration de directives, principes, évaluation, méthodologie et frameworks de risque des meilleures pratiques & # 8221;Pour la sécurité de l'IA et pour l'objectif de promouvoir le développement et l'adoption sécurisés de l'IA dans & # 8220; nos systèmes de sécurité nationale et notre base industrielle de défense. & # 8221; ...
The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models from theft and sabotage as a major national security challenge, especially as generative AI technologies emerge with immense transformative potential for both good and evil. Nakasone said it would become “NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation, methodology and risk frameworks” for both AI security and the goal of promoting the secure development and adoption of AI within “our national security systems and our defense industrial base.”...
Studies Industrial ★★
InfoSecurityMag.webp 2023-10-02 16:00:00 Le FBI met en garde contre les attaques de deux ransomwares et les tendances de destruction des données
FBI Warns of Dual Ransomware Attacks and Data Destruction Trends
(lien direct)
Les pirates déploient différentes variantes de ransomware, notamment Avoslocker et Hive, entre autres
Hackers are deploying different ransomware variants, including AvosLocker and Hive, among others
Ransomware Studies ★★★★
CyberWarzone.webp 2023-10-02 15:25:08 Pourquoi les Néerlandais hésitent-ils à dépenser en cybersécurité?Un examen plus approfondi des statistiques (2023)
Why Are the Dutch Hesitant to Spend on Cybersecurity? A Closer Look at the Stats (2023)
(lien direct)
La cybersécurité vaut-elle vraiment les dépenses?C'est une question qui semble être dans l'esprit de beaucoup dans le
Is cybersecurity really worth the expense? That’s a question that seems to be on the minds of many in the
Studies ★★★
DarkReading.webp 2023-10-02 07:00:00 La menace silencieuse des API: ce que les nouvelles données révèlent sur le risque inconnu
The Silent Threat of APIs: What the New Data Reveals About Unknown Risk
(lien direct)
La croissance rapide des API crée une surface d'attaque élargie et augmentant les risques de cybersécurité inconnus.
The rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.
Threat Threat Studies ★★★
ProofPoint.webp 2023-10-01 15:40:58 Entretien des sponsors Risky Biz: l'écosystème du crime électronique change
Risky Biz Sponsor Interview: The e-crime ecosystem is changing
(lien direct)
La croissance rapide des API crée une surface d'attaque élargie et augmentant les risques de cybersécurité inconnus.
The rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.
Studies ★★★★
globalsecuritymag.webp 2023-09-29 10:59:02 Veracode dévoile son rapport State of Software Security : la sécurité des logiciels est en retard en Europe (lien direct) Veracode dévoile son rapport State of Software Security : la sécurité des logiciels est en retard en Europe Les entreprises de la région EMEA sont exposées à un risque accru lié aux vulnérabilités dans le code généré par des tiers et par l'intelligence artificielle (IA) - Investigations Studies ★★★
globalsecuritymag.webp 2023-09-28 20:58:02 Le 5e rapport annuel de sécurité des données de GetApp \\: les entreprises américaines voient les cyberattaques à baisser & # 8211; mais elles sont toujours à un niveau non durable
GetApp\\'s 5th Annual Data Security Report: U.S. Businesses See Cyberattacks Tick Down–But They\\'re Still At Unsustainably High Level
(lien direct)
U.S.Les entreprises voient les cyberattaques à baisser & # 8211; mais elles sont toujours à un niveau sans durcissement Le 5e rapport annuel de sécurité des données de GetApp révèle une baisse des attaques de phishing et de ransomware, mais les retombées des attaques de Las Vegas soulignent les vulnérabilités massives de l'ingénierie sociale qui affligent toujours les entreprises - rapports spéciaux
U.S. Businesses See Cyberattacks Tick Down–But They\'re Still At Unsustainably High Level GetApp\'s 5th Annual Data Security Report reveals a drop in phishing and ransomware attacks, but fallout from the Las Vegas attacks underscores the massive social engineering vulnerabilities still plaguing businesses - Special Reports
Ransomware Vulnerability Studies Conference ★★★
Mandiant.webp 2023-09-28 12:00:00 Analyse des tendances du temps à exploiter: 2021-2022
Analysis of Time-to-Exploit Trends: 2021-2022
(lien direct)
résumé exécutif Mandiant Intelligence a analysé 246 vulnérabilités qui ont été exploitées entre 2021 et 2022. soixante-deux pour cent (153) des vulnérabilités ont d'abord été exploitées sous forme de vulnérabilités de jour zéro. Le nombre de vulnérabilités exploitées chaque année continue d'augmenter, tandis que les temps à exploiter (TTES) globaux que nous voyons diminuent. L'exploitation d'une vulnérabilité est le plus susceptible de se produire avant la fin du premier mois suivant la sortie d'un correctif. Microsoft, Google et Apple continuent d'être les fournisseurs les plus exploités d'une année à l'autre, mais les deux dernières années
Executive Summary Mandiant Intelligence analyzed 246 vulnerabilities that were exploited between 2021 and 2022. Sixty-two percent (153) of the vulnerabilities were first exploited as zero-day vulnerabilities. The number of exploited vulnerabilities each year continues to increase, while the overall times-to-exploit (TTEs) we are seeing are decreasing. Exploitation of a vulnerability is most likely to occur before the end of the first month following the release of a patch. Microsoft, Google, and Apple continue to be the most exploited vendors year-over-year, but the last two years
Vulnerability Studies ★★★★
globalsecuritymag.webp 2023-09-28 09:04:51 Etude mondiale ESG/Zerto : Les organisations considèrent les ransomwares comme l\'une des trois principales menaces pour leur pérennité (lien direct) Les organisations considèrent les ransomwares comme l'une des trois principales menaces pour leur pérennité selon une étude mondiale ESG/Zerto Pour atténuer ces attaques, les professionnels de l'IT doivent prendre en considération à la fois la protection des données métier et des données d'infrastructure - Investigations Threat General Information Studies ★★★
SecureList.webp 2023-09-28 08:00:35 Un cryptor, un voleur et un cheval de Troie bancaire
A cryptor, a stealer and a banking trojan
(lien direct)
Dans ce rapport, nous partageons nos dernières conclusions Crimeware: le cryptor / chargeur Asmcrypt lié à DoubleFinger, un nouveau voleur Lumma et une nouvelle version de Zanubis Android Banking Trojan.
In this report, we share our latest crimeware findings: the ASMCrypt cryptor/loader related to DoubleFinger, a new Lumma stealer and a new version of Zanubis Android banking trojan.
Studies ★★★
DarkReading.webp 2023-09-27 22:05:00 Netscout a identifié près de 7,9 millions d'attaques DDOS au premier semestre de 2023
Netscout Identified Nearly 7.9M DDOS Attacks in the First Half of 2023
(lien direct)
Dans ce rapport, nous partageons nos dernières conclusions Crimeware: le cryptor / chargeur Asmcrypt lié à DoubleFinger, un nouveau voleur Lumma et une nouvelle version de Zanubis Android Banking Trojan.
In this report, we share our latest crimeware findings: the ASMCrypt cryptor/loader related to DoubleFinger, a new Lumma stealer and a new version of Zanubis Android banking trojan.
General Information Studies ★★★★
InfoSecurityMag.webp 2023-09-27 15:30:00 Les attaques BEC augmentent de 279% des soins de santé
BEC Attacks Increase By 279% in Healthcare
(lien direct)
Une sécurité anormale a également trouvé une augmentation de 167% des attaques de courrier électronique avancées
Abnormal Security also found a 167% increase in advanced email attacks
Studies ★★★
GoogleSec.webp 2023-09-27 12:51:29 Les lacunes de sécurité et de confidentialité SMS montrent clairement que les utilisateurs ont besoin d'une mise à niveau de messagerie
SMS Security & Privacy Gaps Make It Clear Users Need a Messaging Upgrade
(lien direct)
Posted by Eugene Liderman and Roger Piqueras Jover SMS texting is frozen in time. People still use and rely on trillions of SMS texts each year to exchange messages with friends, share family photos, and copy two-factor authentication codes to access sensitive data in their bank accounts. It\'s hard to believe that at a time where technologies like AI are transforming our world, a forty-year old mobile messaging standard is still so prevalent. Like any forty-year-old technology, SMS is antiquated compared to its modern counterparts. That\'s especially concerning when it comes to security. The World Has Changed, But SMS Hasn\'t Changed With It According to a recent whitepaper from Dekra, a safety certifications and testing lab, the security shortcomings of SMS can notably lead to: SMS Interception: Attackers can intercept SMS messages by exploiting vulnerabilities in mobile carrier networks. This can allow them to read the contents of SMS messages, including sensitive information such as two-factor authentication codes, passwords, and credit card numbers due to the lack of encryption offered by SMS. SMS Spoofing: Attackers can spoof SMS messages to launch phishing attacks to make it appear as if they are from a legitimate sender. This can be used to trick users into clicking on malicious links or revealing sensitive information. And because carrier networks have independently developed their approaches to deploying SMS texts over the years, the inability for carriers to exchange reputation signals to help identify fraudulent messages has made it tough to detect spoofed senders distributing potentially malicious messages. These findings add to the well-established facts about SMS\' weaknesses, lack of encryption chief among them. Dekra also compared SMS against a modern secure messaging protocol and found it lacked any built-in security functionality. According to Dekra, SMS users can\'t answer \'yes\' to any of the following basic security questions: Confidentiality: Can I trust that no one else can read my SMSs? Integrity: Can I trust that the content of the SMS that I receive is not modified? Authentication: Can I trust the identity of the sender of the SMS that I receive? But this isn\'t just theoretical: cybercriminals have also caught on to the lack of security protections SMS provides and have repeatedly exploited its weakness. Both novice hackers and advanced threat actor groups (such as UNC3944 / Scattered Spider and APT41 investigated by Mandiant, part of Google Cloud) leverage the security deficiencies in SMS to launch different Vulnerability Threat Studies APT 41 ★★★
itsecurityguru.webp 2023-09-27 11:41:56 Akamai Research trouve le nombre de cyberattaques sur les services financiers européens a plus que doublé en 2023
Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023
(lien direct)
Akamai Technologies, Inc. a publié aujourd'hui un nouveau rapport sur l'état d'Internet qui explore les cyberattaques existantes et émergentes contre l'industrie des services financiers.Le nouveau rapport, The High Stakes of Innovation: Attack Trends in Financial Services, constate que les services financiers sont le troisième vecteur attaqué dans la région d'Europe, du Moyen-Orient et d'Afrique (EMEA), [& # 8230;]
Akamai Technologies, Inc. has today released a new State of the Internet report that explores existing and emerging cyberattacks against the financial services industry. The new report, The High Stakes of Innovation: Attack Trends in Financial Services, finds that financial services is the third-most attacked vector in the Europe, Middle East, and Africa (EMEA) region, […]
Studies ★★★
Pirate.webp 2023-09-27 11:15:52 Le nombre de cyberattaques contre les services financiers européens a plus que doublé en 2023 (lien direct) >Akamai partage aujourd’hui les résultats de son rapport Etats des lieux de l’Internet qui se penche sur les cybermenaces existantes et émergentes contre le secteur des services financiers. Tribune – Ce rapport intitulé The High Stakes of innovation : Attack Trends in Financial Services révèle que les services financiers sont aujourd'hui la troisième industrie la plus visée par des cyberattaques sur […] The post Le nombre de cyberattaques contre les services financiers européens a plus que doublé en 2023 first appeared on UnderNews. Studies ★★★
itsecurityguru.webp 2023-09-27 10:00:53 L'étude de sécurité des gardiens montre des changements culturels impératifs pour améliorer les rapports des cyber-incidents
Keeper Security study shows cultural changes imperative to improve cyber incident reporting
(lien direct)
Keeper Security, un fournisseur de logiciels de cybersécurité zéro-trust et zéro-connaissances protégeant les mots de passe, Passkeys, secrets, connexions et accès privilégié, a publié les résultats de son enquête sur les catastrophes en cybersécurité: rapports sur les incidents & # 38;Divulgation.Ils révèlent des lacunes généralisées dans la déclaration des attaques de cybersécurité et des violations, à la fois au leadership interne et aux autorités externes.& # 160;Le rapport sur les incidents de cybersécurité tombe en courte du gardien & # 8217; s [& # 8230;]
Keeper Security, a provider of cloud-based zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, secrets, connections and privileged access, has released findings of its Cybersecurity Disasters Survey: Incident Reporting & Disclosure. They reveal widespread shortcomings in reporting cybersecurity attacks and breaches, both to internal leadership and external authorities.   Cybersecurity incident reporting falls short  Keeper’s […]
Studies ★★
globalsecuritymag.webp 2023-09-27 08:56:26 Selon Imperva, les entreprises Françaises doivent envisager une "diète de données" (lien direct) Selon Imperva, les entreprises Françaises doivent envisager une "diète de données". Les entreprises Françaises pourraient réduire considérablement le risque de cybercriminalité en détruisant des téraoctets de données inutilisées. - Points de Vue Studies ★★★
The_Hackers_News.webp 2023-09-26 16:02:00 Rapport de menace: L'industrie de la haute technologie a ciblé le plus avec 46% du trafic d'attaque marqué NLX
Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic
(lien direct)
Comment utiliser ce rapport Améliorer la conscience de la situation des techniques utilisées par les acteurs de la menace Identifier les attaques potentielles ciblant votre industrie Obtenir des informations pour aider à améliorer et à accélérer la réponse à la menace de votre organisation \\ Résumé des résultats Le rapport sur les menaces d'effet du réseau offre des informations basées sur des données uniques de la WAF de nouvelle génération rapide de la nouvelle génération du T2 2023 (1er avril 2023 au 30 juin 2023).Ce rapport
How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry Gain insights to help improve and accelerate your organization\'s threat response Summary of Findings The Network Effect Threat Report offers insights based on unique data from Fastly\'s Next-Gen WAF from Q2 2023 (April 1, 2023 to June 30, 2023). This report
Threat Studies ★★★★
globalsecuritymag.webp 2023-09-26 13:58:34 Keeper Security a publié les résultats de son enquête sur les catastrophes en cybersécurité: reporting des incidents et divulgation
Keeper Security released findings of its Cybersecurity Disasters Survey: Incident Reporting & Disclosure
(lien direct)
Sécurité des gardiens Sortie des catastrophes en cybersécurité: reporting d'incident et divulgation La recherche révèle que 40% des organisations ont connu un incident de cybersécurité, mais 48% n'ont pas divulgué ces incidents aux autorités appropriées - rapports spéciaux
Keeper Security Releases Cybersecurity Disasters Survey: Incident Reporting & Disclosure Research finds 40% of organizations have experienced a cybersecurity incident, yet 48% did not disclose those incidents to the appropriate authorities - Special Reports
Studies
Last update at: 2024-05-16 04:07:56
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter