What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ESET.webp 2024-04-02 09:30:00 Des logiciels malveillants se cachent dans les photos?Plus probable que vous ne le pensez
Malware hiding in pictures? More likely than you think
(lien direct)
Il y a plus dans certaines images qui rencontrent l'œil & # 8211;Leurs fa & ccedil apparemment innocents; Ade peut masquer une menace sinistre.
There is more to some images than meets the eye – their seemingly innocent façade can mask a sinister threat.
Malware Threat ★★★
ESET.webp 2024-03-14 13:30:00 L'intelligence des menaces a expliqué |Déverrouillé 403: un podcast de cybersécurité
Threat intelligence explained | Unlocked 403: A cybersecurity podcast
(lien direct)
Nous décomposons les principes fondamentaux de l'intelligence des menaces et de son rôle dans l'anticipation et la lutte contre les menaces émergentes
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats
Threat ★★
ESET.webp 2024-01-26 13:39:32 Blackwood Hijacks Software Mises à jour pour déployer NSPX30 & # 8211;Semaine en sécurité avec Tony Anscombe
Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
(lien direct)
L'acteur de menace inconnu a utilisé l'implant pour cibler les entreprises chinoises et japonaises, ainsi que des individus en Chine, au Japon et au Royaume-Uni
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK
Threat ★★
ESET.webp 2023-12-22 10:50:20 Résultats clés du rapport de la menace ESET H2 2023 & # 8211;Semaine en sécurité avec Tony Anscombe
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
(lien direct)
Comment les cybercriminels profitent de la popularité de Chatgpt et d'autres outils de ses semblables pour diriger les gens vers des sites sommaires, ainsi que d'autres résultats intéressants du dernier rapport de menace d'Eset \\
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET\'s latest Threat Report
Tool Threat Studies ChatGPT ★★★★
ESET.webp 2023-12-19 10:27:56 Rapport de menace ESET H2 2023
ESET Threat Report H2 2023
(lien direct)
Une vision du paysage des menaces H2 2023 vu par la télémétrie ESET et du point de vue des experts de la détection et de la recherche des menaces ESET
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Threat ★★
ESET.webp 2023-11-10 10:30:00 Intelligence cyber-menace: se mettre sur le pied avant contre les adversaires
Cyber threat intelligence: Getting on the front foot against adversaries
(lien direct)
En collectant, en analysant et en contextualiser les informations sur les cyber-threats possibles, y compris les plus avancées, la menace de renseignement offre une méthode critique pour identifier, évaluer et atténuer les cyber-risques
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
Threat ★★
ESET.webp 2023-10-27 13:47:16 Serveurs de lamelle Web Roundcube sous attaque & # 8211;Semaine en sécurité avec Tony Anscombe
Roundcube Webmail servers under attack – Week in security with Tony Anscombe
(lien direct)
L'exploit zéro-jour déployé par le groupe d'hiver Vivern APT nécessite seulement que la cible considère un message spécialement conçu dans un navigateur Web
The zero-day exploit deployed by the Winter Vivern APT group only requires that the target views a specially crafted message in a web browser
Threat
ESET.webp 2023-09-22 21:42:55 Recherche de menace de pointe de l'ESET à LabsCon & # 8211;Semaine en sécurité avec Tony Anscombe
ESET\\'s cutting-edge threat research at LABScon – Week in security with Tony Anscombe
(lien direct)
Cette année, deux chercheurs de logiciels malveillants ESET sont allés sur le laboratoire pour déconstruire des attaques sophistiquées menées par deux groupes APT bien connus
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups
Malware Threat ★★
ESET.webp 2023-08-18 09:54:37 Évacuation de 30 000 pirates et # 8211;Semaine en sécurité avec Tony Anscombe
Evacuation of 30,000 hackers – Week in security with Tony Anscombe
(lien direct)
Def Con, la convention annuelle des pirates à Las Vegas, a été interrompue samedi soir lorsque les autorités ont évacué le lieu de l'événement en raison d'une menace de bombe
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event\'s venue due to a bomb threat
Threat ★★
ESET.webp 2023-08-10 19:49:00 Podcast de recherche ESET: démasquage MoustachedBoucer
ESET Research Podcast: Unmasking MoustachedBouncer
(lien direct)
Écoutez le directeur de la recherche sur les menaces d'Eset \\, Jean-Ian Boutin déracine les tactiques, les techniques et les procédures de MoustachedBouner, un groupe approprié qui vise les ambassades étrangères au Bélarus
Listen as ESET\'s Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus
Threat ★★
ESET.webp 2023-07-14 15:30:47 Résultats clés du rapport de la menace ESET H1 2023 & # 8211;Semaine en sécurité avec Tony Anscombe
Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe
(lien direct)
> Voici comment les cybercriminels ont ajusté leurs tactiques en réponse aux politiques de sécurité plus strictes de Microsoft et à d'autres résultats intéressants du nouveau rapport de menace d'Eset \\
>Here\'s how cybercriminals have adjusted their tactics in response to Microsoft\'s stricter security policies and other interesting findings from ESET\'s new Threat Report
Threat ★★★
ESET.webp 2023-07-14 13:30:00 Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe (lien direct) Voici comment les cybercriminels ont ajusté leurs tactiques en réponse aux politiques de sécurité plus strictes de Microsoft, ainsi que d'autres résultats intéressants du nouveau rapport de menace d'Eset \\
Here\'s how cybercriminals have adjusted their tactics in response to Microsoft\'s stricter security policies, plus other interesting findings from ESET\'s new Threat Report
Threat Studies Medical ★★★★
ESET.webp 2023-07-11 09:30:15 Rapport de menace ESET H1 2023
ESET Threat Report H1 2023
(lien direct)
> Une vision du paysage des menaces H1 2023 vu par la télémétrie ESET et du point de vue des experts de détection et de recherche des menaces ESET
>A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Threat ★★★
ESET.webp 2023-06-08 09:30:17 Ambuscade d'asile: CrimeWare ou Cyberespionage?
Asylum Ambuscade: crimeware or cyberespionage?
(lien direct)
Un curieux cas d'acteur de menace à la frontière entre Crimeware et Cyberespionage
A curious case of a threat actor at the border between crimeware and cyberespionage
Threat ★★
ESET.webp 2023-06-01 09:30:02 Tous les yeux sur les API: les 3 premiers risques de sécurité de l'API et comment les atténuer
All eyes on APIs: Top 3 API security risks and how to mitigate them
(lien direct)
> Comme les API sont une cible préférée pour les acteurs de la menace, le défi de sécuriser la colle qui maintient divers éléments logiciels ensemble consiste à accroître l'urgence
>As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
Threat ★★
ESET.webp 2023-05-12 15:15:46 Résultats clés du nouveau rapport d'activité APT d'ESET \\ & # 8211;Semaine en sécurité avec Tony Anscombe
Key findings from ESET\\'s new APT Activity Report – Week in security with Tony Anscombe
(lien direct)
Qu'est-ce que certains des acteurs de menace avancés les plus infâmes du monde ont fait et quelles pourraient être les implications de leurs activités pour votre entreprise?
What have some of the world\'s most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Threat ★★
ESET.webp 2023-05-05 14:00:25 APTS cible l'accès MSP aux réseaux clients & # 8211;Semaine en sécurité avec Tony Anscombe
APTs target MSP access to customer networks – Week in security with Tony Anscombe
(lien direct)
> Le récent compromis des réseaux de plusieurs sociétés via l'abus d'un outil d'accès à distance utilisé par MSPS illustre pourquoi les acteurs de menace alignés par l'État devraient être sur les radars des fournisseurs de services informatiques
>The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Tool Threat ★★
ESET.webp 2023-04-14 11:00:23 Chasser Blacklotus & # 8211;Semaine en sécurité avec Tony Anscombe
Hunting down BlackLotus – Week in security with Tony Anscombe
(lien direct)
> Microsoft publie des conseils sur la façon dont les organisations peuvent vérifier leurs systèmes pour la présence de BlackLotus, une puissante menace analysée pour la première fois par les chercheurs ESET
>Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
Threat ★★
ESET.webp 2023-04-14 09:30:14 Sécurité d'abord: 5 conseils de cybersécurité pour les blogueurs indépendants
Safety first: 5 cybersecurity tips for freelance bloggers
(lien direct)
> Le bloc de l'écrivain très redouté n'est pas la seule menace qui pourrait dérailler vos progrès.En faites-vous assez pour garder votre blog (et votre gagne-pain) à l'abri des dangers en ligne?
>The much-dreaded writer\'s block isn\'t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
Threat ★★★
ESET.webp 2023-03-29 09:30:03 Escroqueries de boucherie de porc: l'anatomie d'une menace à croissance rapide [Pig butchering scams: The anatomy of a fast‑growing threat] (lien direct) Comment les fraudeurs soignent leurs marques et emménagent pour la mise à mort en utilisant les astuces des livres de jeu de romance et d'investissement
How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers
Threat ★★★
ESET.webp 2023-03-10 14:00:00 APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe (lien direct) A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds Threat ★★★★
ESET.webp 2023-02-10 15:00:11 Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe (lien direct) What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? Ransomware Threat ★★
ESET.webp 2023-02-08 10:30:08 (Déjà vu) ESET Threat Report T3 2022 (lien direct) >A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat ★★★★
ESET.webp 2023-02-03 14:00:03 Key takeaways from ESET\'s new APT Activity Report – Week in security with Tony Anscombe (lien direct) As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real Threat ★★★
ESET.webp 2022-12-05 10:30:26 Tractors vs. threat actors: How to hack a farm (lien direct) >Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat. Hack Threat ★★
ESET.webp 2022-11-04 13:30:38 Ransomware rages on – Week in security with Tony Anscombe (lien direct) >This week's news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure worldwide Ransomware Threat
ESET.webp 2022-10-14 10:00:26 ESET research into POLONIUM\'s arsenal – Week in security with Tony Anscombe (lien direct) More than a dozen organizations operating in various verticals were attacked by the threat actor Threat
ESET.webp 2022-10-07 14:15:41 Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe (lien direct) A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year Threat
ESET.webp 2022-10-05 09:30:10 (Déjà vu) ESET Threat Report T2 2022 (lien direct) >A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat ★★★
ESET.webp 2022-07-04 09:30:59 Cyberattacks: A very real existential threat to organizations (lien direct) >One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? Threat
ESET.webp 2022-06-03 16:15:16 Key insights from ESET\'s latest Threat Report – Week in security with Tony Anscombe (lien direct) A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses Threat
ESET.webp 2022-06-02 12:00:41 (Déjà vu) ESET Threat Report T 1 2022 (lien direct) >A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat
ESET.webp 2022-05-26 12:00:28 ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit (lien direct) >Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution Threat
ESET.webp 2022-05-06 14:15:26 Defending against APT attacks – Week in security with Tony Anscombe (lien direct) The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data Threat ★★★★
ESET.webp 2022-03-14 10:30:44 A first look at threat intelligence and threat hunting tools (lien direct) An overview of some of the most popular open-source tools for threat intelligence and threat hunting Threat
ESET.webp 2022-02-09 10:30:07 ESET Threat Report T3 2021 (lien direct) A view of the T3 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat ★★
ESET.webp 2021-12-07 10:30:30 5 common gift card scams and how to spot them (lien direct) It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season Threat
ESET.webp 2021-11-19 14:00:00 CYBERWARCON – Foreign influence operations grow up (lien direct) Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks. Threat
ESET.webp 2021-10-27 09:30:06 Wslink: Unique and undocumented malicious loader that runs as a server (lien direct) There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor Tool Threat
ESET.webp 2021-08-06 13:00:23 IIStealer: A server‑side threat to e‑commerce transactions (lien direct) The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information Threat ★★★★
ESET.webp 2021-07-29 09:30:38 Tackling the insider threat to the new hybrid workplace (lien direct) Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can - willingly or unwitingly - pose. Threat
ESET.webp 2021-07-23 09:30:17 Protecting the hybrid workplace through Zero Trust security (lien direct) The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors. Threat
ESET.webp 2021-06-21 09:30:49 State‑sponsored or financially motivated: Is there any difference anymore? (lien direct) What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape? Threat
ESET.webp 2021-06-09 12:00:38 Gelsemium: When threat actors go gardening (lien direct) ESET researchers shed light on new campaigns from the quiet Gelsemium group Threat
ESET.webp 2021-06-03 09:30:11 ESET Threat Report T1 2021 (lien direct) A view of the T1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat
ESET.webp 2021-05-17 13:00:23 Take action now – FluBot malware may be on its way (lien direct) Why FluBot is a major threat for Android users, how to avoid falling victim, and how to get rid of the malware if your device has already been compromised Malware Threat
ESET.webp 2021-04-27 16:37:41 Apple patches severe macOS security flaw (lien direct) Mac users are being urged to update to macOS Big Sur 11.3 as at least one threat group is exploiting the zero-day bug to sneak past the operating system's built-in security mechanisms Threat
ESET.webp 2021-04-06 09:30:27 Janeleiro, the time traveler: A new old banking trojan in Brazil (lien direct) ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil Threat
ESET.webp 2021-03-22 10:30:38 5 reasons why (not only) financial companies struggle with cybersecurity (lien direct) Why do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks? Threat
ESET.webp 2021-02-08 10:30:47 (Déjà vu) ESET Threat Report Q4 2020 (lien direct) A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts Threat
Last update at: 2024-04-27 12:08:25
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter