Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2018-09-13 17:39:01 |
Breach Trends and Tips From Visa Threat Intelligence Exec Glen Jones (lien direct) |
Macy's, Adidas, Panera Bread and Chili's. These are just a few of the retailers and merchants who made headline news in the last few months when they became victims of cyberattacks that put payment card data and other personally identifiable information (PII) at risk for thousands of customers.
|
Threat
|
|
|
 |
2018-09-13 15:52:02 |
Barrage of Mobile Fraud Attacks Will Increase (lien direct) |
Mobile, as a financial fraud threat vector, is growing dramatically. Fifty-eight percent of digital transactions now originate from mobile devices, and one-third of attacks are via mobile.
|
Threat
|
|
|
 |
2018-09-11 19:55:00 |
Microsoft Patches Windows Zero-Day Disclosed via Twitter (lien direct) |
Microsoft's Patch Tuesday updates for September 2018 address over 60 vulnerabilities, including a zero-day disclosed by a researcher and exploited shortly after by a threat actor.
|
Threat
|
|
|
 |
2018-09-07 09:00:01 |
Opsec Mistakes Allowed U.S. to Link North Korean Man to Hacks (lien direct) |
A 34-year-old North Korean national has been charged by U.S. authorities over his alleged involvement in the cyberattacks carried out by the Lazarus Group. An affidavit filed by an FBI special agent reveals how investigators linked the man to the notorious threat actor.
|
Threat
Medical
|
APT 38
|
|
 |
2018-09-06 14:28:05 |
Preventing the Other Kind of Hack Back (lien direct) |
There has been endless discussion among security professionals about the ethics, propriety, legality, and effectiveness of corporations “hacking back” against attackers. On the other hand, there is no hesitation on the part of attackers to hack back against threat intelligence researchers who are investigating them.
|
Hack
Threat
|
|
|
 |
2018-09-05 15:08:02 |
Windows Zero-Day Exploited in Targeted Attacks by \'PowerPool\' Group (lien direct) |
A threat group tracked by security firm ESET as “PowerPool” has been exploiting a Windows zero-day vulnerability to elevate the privileges of a backdoor in targeted attacks.
|
Vulnerability
Threat
|
|
|
 |
2018-09-05 02:18:02 |
GOBLIN PANDA Targets Vietnam Again (lien direct) |
CrowdStrike security researchers have observed renewed activity associated with GOBLIN PANDA, a threat actor mainly targeting entities in Southeast Asia.
|
Threat
|
|
|
 |
2018-09-04 14:38:01 |
Automating in Security With Intelligence (lien direct) |
No Automated Tool is Capable of Providing the Full Context in Which a Threat Was Developed and Deployed
|
Tool
Threat
|
|
|
 |
2018-08-31 12:34:04 |
Researchers Draw Connections Between APTs (lien direct) |
A newly discovered threat group shares similarities with three advanced persistent threats (APTs), Trend Micro security researchers have discovered.
|
Threat
|
|
|
 |
2018-08-28 14:07:03 |
Critical Apache Struts Vulnerability Exploited in Live Attacks (lien direct) |
A Critical remote code execution vulnerability in Apache Struts 2 that was patched last week is already being abused in malicious attacks, threat intelligence firm Volexity warns.
|
Vulnerability
Threat
|
|
★★
|
 |
2018-08-27 15:54:02 |
NIST\'s New Advice on Medical IoT Devices (lien direct) |
Medical infusion pumps, which deliver medications to patients, are archetypal examples of the expanding threat surface being delivered by connected devices. Connecting these pumps to clinical systems can improve healthcare delivery, but if not properly secured could endanger the patient and expose the health delivery organization (HDO) infrastructure to intrusion.
|
Threat
|
|
|
 |
2018-08-27 15:04:05 |
"Evil Internet Minute" Report Shows Scale of Malicious Online Activity (lien direct) |
Every day, cyber threat intelligence firm RiskIQ hoovers up terabytes of internet data. It concentrates on the internet infrastructure and how it functions, gathering up domains, IP addresses, email addresses and web page materials. It does this on behalf of its customers.
|
Threat
|
|
|
 |
2018-08-16 20:20:00 |
ESET Launches New Enterprise Security Tools (lien direct) |
ESET on Thursday announced the general availability of a new line of enterprise security solutions that include endpoint detection and response (EDR), forensic investigation, threat monitoring, sandbox, and management tools.
|
Threat
|
|
|
 |
2018-08-16 10:26:04 |
Profile of a Threat Hunter (lien direct) |
"The history of the bow and arrow is the history of mankind." – Fred Bear
|
Threat
|
|
|
 |
2018-08-09 19:34:03 |
Researchers Say Code Reuse Links North Korea\'s Malware (lien direct) |
Following trails of reused code, security researchers at Intezer and McAfee have uncovered new links between malware families attributed to North Korean threat groups and tracked most of the samples to the infamous |
Malware
Threat
|
APT 38
|
|
 |
2018-08-09 13:39:00 |
Flaws in Siemens Tool Put ICS Environments at Risk (lien direct) |
Serious vulnerabilities discovered by researchers in Siemens' TIA Portal for SIMATIC STEP7 and SIMATIC WinCC can be exploited by threat actors for lateral movement and other purposes in ICS environments.
|
Tool
Threat
|
|
★★★
|
 |
2018-08-09 02:58:00 |
DarkHydrus Uses Open Source Phishery Tool in Middle-East Attacks (lien direct) |
The recently detailed DarkHydrus threat group is leveraging the open-source Phishery tool to create malicious documents used in attacks on government entities in the Middle East, Palo Alto Networks warns.
|
Tool
Threat
|
|
|
 |
2018-07-31 12:23:04 |
Mimecast Acquires Threat Detection Startup Solebit for $88 Million (lien direct) |
Email and data security firm Mimecast (NASDAQ: MIME) announced on Tuesday that it has acquired threat detection firm Solebit for approximately $88 million net of cash acquired.
|
Threat
|
|
|
 |
2018-07-30 12:52:05 |
DMARC Fully Implemented by Half of U.S. Government Agencies (lien direct) |
More than half of U.S. government agencies have fully implemented the DMARC email security standard in response to a binding operational directive from the Department of Homeland Security, according to email threat protection company Agari.
|
Threat
|
|
|
 |
2018-07-20 13:55:02 |
DOJ Cybersecurity Task Force Outlines Plans for Protecting Elections (lien direct) |
The U.S. Justice Department's Cyber-Digital Task Force made public its first report on Thursday, covering the threat to elections, cybercrime schemes, and various other topics.
|
Threat
|
|
|
 |
2018-07-11 16:15:02 |
AT&T to Acquire Threat Management Firm AlienVault (lien direct) |
AT&T on Tuesday said it would acquire San Mateo, Calif.-based threat management and intelligence firm AlienVault for an undisclosed sum.
|
Threat
|
|
|
 |
2018-07-09 19:55:03 |
New Attacks on Palestine Linked to \'Gaza Cybergang\' (lien direct) |
The Gaza Cybergang, an advanced persistent threat (APT) group linked to the Palestinian terrorist organization Hamas, apparently continues to target organizations in the Middle East, researchers at Check Point revealed last week.
|
Threat
|
|
|
 |
2018-07-02 11:46:04 |
Insider Threat: Common Myths and Misconceptions (lien direct) |
Insider threat is a growing area of concern and confusion among security practitioners. Typically accustomed to concentrating their resources on combating external threats, many security teams are eager yet unsure of how to combat threats that arise internally. This uncertainty, unfortunately, is often exacerbated by numerous common myths and misconceptions about insider threat, some of which include:
|
Threat
|
|
|
 |
2018-06-28 14:27:00 |
Threat Detection Firm Cynet Raises $13 Million (lien direct) |
Threat detection and response company Cynet on Wednesday announced that it raised $13 million in a Series B funding round, which brings the total raised to date to $20 million.
|
Threat
|
|
|
 |
2018-06-28 12:56:02 |
Identity-based Threat Detection Preempt Raises $17.5 Million (lien direct) |
San Francisco, Calif (HQ) and Ramat Gan, Israel (R&D) threat prevention firm Preempt has raised $17.5 million in a Series B funding round supported by ClearSky, Blackstone, Intel Capital and General Catalyst. The total raised by Preempt now stands at $27.5 million, having raised $2 million as seed funding in 2014, and $8 million in a Series A round in 2016.
|
Threat
|
|
|
 |
2018-06-27 17:08:01 |
Cyber-Espionage Campaigns Target Tibetan Community in India (lien direct) |
Two cyberespionage campaigns targeting the Tibetan community based in India appear to be the work of Chinese threat actors, a new Recorded Future report reveals.
|
Threat
|
|
|
 |
2018-06-27 04:50:05 |
Cisco ASA Flaw Exploited in DoS Attacks (lien direct) |
Cisco has informed users that a recently patched vulnerability affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software has been exploited in denial-of-service (DoS) attacks.
|
Vulnerability
Threat
|
|
|
 |
2018-06-26 06:00:02 |
FireEye Denies Hacking Back Against Chinese Cyberspies (lien direct) |
In his latest book, New York Times correspondent David Sanger describes how cybersecurity firm Mandiant hacked into the devices of Chinese cyberspies during its investigation into the threat group known as APT1.
|
Threat
|
|
|
 |
2018-06-22 14:38:05 |
How to Shed the Security Operations Doldrums (lien direct) |
Automating Threat Intelligence Prioritization Allows You to Proactively Deploy Appropriate Intelligence to the Right Tools
|
Threat
|
|
|
 |
2018-03-13 10:15:04 |
Stealthy Data Exfiltration Possible via Headphones, Speakers (lien direct) |
A team of researchers has demonstrated how air-gapped computers can stealthily communicate with each other using speakers or headphones over ultrasonic waves.
|
Threat
|
|
|
 |
2018-03-12 14:46:01 |
New Hacking Team Spyware Samples Detected: ESET (lien direct) |
New samples of Hacking Team's Remote Control System (RCS) flagship spyware have recently emerged, slightly different from previously observed variations, ESET warns.Hacking Team, an Italian spyware vendor founded in 2003, is well known for selling surveillance tools to governments worldwide.
|
Threat
|
|
|
 |
2018-03-12 14:27:04 |
Remotely Exploitable Flaws Found in SmartCam Cameras (lien direct) |
Hanwha's SmartCam cameras are affected by more than a dozen vulnerabilities, including critical flaws that can be exploited remotely to take control of devices.
|
Threat
|
|
|
 |
2018-03-07 17:09:02 |
Gozi Banking Trojan Uses "Dark Cloud" Botnet for Distribution (lien direct) |
The well-known Gozi ISFB banking Trojan recently started using the elusive "Dark Cloud" botnet for distribution, Talos warns.
|
Threat
|
|
★★★
|
 |
2018-03-07 15:53:04 |
Cryptocurrencies and the Revolution in Cybercrime Economics (lien direct) |
|
Threat
|
|
|