What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CSO.webp 2018-10-16 11:47:00 Best new Windows 10 security features: More patching, updating flexibility (lien direct) With the new era of Windows as a service, Microsoft is rolling out changes to the operating system twice a year. Many of those changes will allow you to improve your security posture and offer more security choices. You no longer have to wait for a new operating system to deploy new security features. [ Learn how to identify, block and remove malware from Windows PCs. | Get the latest from CSO by signing up for our newsletters. ] Below is a summary of all the new security features and options in Windows 10 version 1809, which features Windows Defender Advanced Threat Protection (ATP) enhancements, more options for enterprises to update and patch Windows, and other security improvements. Bookmark this article, because we will be adding new security features as Microsoft releases future Windows updates. Malware Threat
CSO.webp 2018-10-16 06:18:00 BrandPost: Addressing the Modern Threat Landscape with Threat Intelligence Services (lien direct) For your customers, identifying and quickly securing against modern cyberthreats is paramount-especially as they adopt digital transformation strategies to better meet the needs of their consumers. Unfortunately, cybercriminals are also moving at an increasingly rapid pace by continually innovating and evolving to exploit new attack vectors.However, given the current cybersecurity skills shortage impacting businesses across industries, the need for rapid threat identification and security implementation is often tempered by human-caused security errors and misconfigurations. In order to maintain an effective security posture that can adapt and respond to the evolving threat landscape at pace-without hindering digital transformation efforts-network professionals need faster and more accurate threat intelligence gathering. With this in mind, Fortinet's threat intelligence services provides your customers with the type of information and analysis they need to secure their digital businesses against modern cyberthreats and facilitate success. Threat
CSO.webp 2018-10-02 08:47:00 SQL injection explained: How these attacks work and how to prevent them (lien direct) SQL injection definition Structured Query Language (SQL) injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL into a database query.Immortalized by "Little Bobby Drop Tables" in XKCD 327, SQL injection (SQLi) was first discovered in 1998, yet continues to plague web applications across the internet. Even the OWASP Top Tenlists injection as the number one threat to web application security. [ Learn why you need an API security program, not a piecemeal approach. | Get the latest from CSO by signing up for our newsletters. ] The good news? SQL injection is the lowest of the low-hanging fruit for both attackers and defenders. SQLi isn't some cutting edge NSA Shadow Brokers kit, it's so simple a three-year old can do it. This is script kiddie stuff-and fixing your web application to mitigate the risk of SQLi is so easy that failure to do so looks more and more like gross negligence. Threat
CSO.webp 2018-10-01 08:14:00 New vicious Torii IoT botnet discovered (lien direct) Torii – you might not have heard the name yet, but this new botnet has advanced techniques and persistence and is a threat to nearly every type of computer. Researchers from Avast warned about Torii, which is certainly no spinoff of Mirai. Torii, they said, is an “example of the evolution of IoT malware” and “its sophistication is a level above anything we have seen before.”For starters, Torii can run on almost every modern computer, smartphone, and tablet. Target architectures include x86_64, x86, ARM, MIPS, Motorola 68k, SuperH, PPC and others. Avast security researcher Martin Hron told The Parallax that one server had over 100 versions of malware payloads and supported 15 to 20 architectures. This suggests a “team effort,” as what Torii can do “would be hard for any on person to accomplish.” Malware Threat ★★
CSO.webp 2018-09-25 08:20:00 (Déjà vu) First known malicious cryptomining campaign targeting Kodi (lien direct) Is your Kodi secretly mining Monero? Yes, sadly some cyberthugs have weaponized Kodi by hiding malware in Kodi add-ons. Researchers discovered the first known malicious cryptomining campaign to be launched via the Kodi platform. There are still about 5,000 victims unknowingly mining Monero via their Kodi for the cyberthugs.Ah man, say it ain't so. Despite Kodi malware scare stories, there's been only one known time that malware was distributed via a Kodi add-on. That hasn't stopped some anti-piracy groups from claiming Kodi was being used to distribute malware.For example, after a watching a video interview filmed at RSA about “how malware is growing on the Kodi/XMBC platform,” Torrent Freak scoffed. The group the interviewee worked with had been putting out Kodi-related malware scare stories to promote anti-piracy. Despite the alarming claims made which were short on actual facts, as far as Torrent Freak knew, only one Kodi addon had ever been used for DDoS purposes and that was back in 2017. The XBMC Foundation president had not heard of malware in a video stream and a threat analyst at BitDefender had not seen any malware in a video stream in the wild since in 2005. Malware Threat
CSO.webp 2018-09-11 07:00:00 BrandPost: Cybersecurity Skills Report: Today\'s CISO is Shifting Toward Strategic Business Enablement (lien direct) Businesses and government agencies of all sizes are experiencing cyber attacks that are growing in both frequency and complexity. Cybercriminals, nation-states, and a host of other bad actors are developing new tactics, tools, and procedures to circumvent modern cybersecurity solutions. We are increasingly seeing targeted attacks employing customized malware and the ready availability of dark web market tools and services covering every aspect of the cyber kill chain. In fact, a recent Fortinet Global Threat Landscape Report shows that virtually no firm is immune, with 96% of firms experiencing at least one severe exploit. Malware Threat
CSO.webp 2018-09-10 09:00:00 IDG Contributor Network: Threat detection: it\'s about \'time\' (lien direct) Incident responders have no shortage of products that help to identify threats. From the earliest virus scanners and IDS products to modern solutions that utilize machine learning to analyze behavior, the goal has always been simple yet unattainable: to keep adversaries from accessing private resources and doing damage to the organization. While there is no specific right or wrong way of trying to achieve this, there is an unspoken principal that is critical to this process is “time.” Time factors into each step of the incident response process, from time to detection through time to containment. Threat
CSO.webp 2018-09-06 11:50:00 IDG Contributor Network: Why data loss prevention is a throwback technology (lien direct) Black Hat 2018 may be behind us, but the trends, conversations and news coming out of the show are still top of mind. The conference was buzzing with cutting-edge topics, from election hacking to “whack-a-mole” security (as dubbed by Parisa Tabriz, director of engineering at Google).For me, Black Hat is a time to connect with customers, prospects, partners, colleagues and friends to discuss the latest in insider threat management. Typically, during conference season, I come away with a few key takeaways (and free swag) that inform decisions I make for the strategy and management of the organization I run. This year proved to be no different.Self-driving cars, election hacking and more Black Hat is one of the top conferences for security professionals to learn about the latest technologies and vulnerabilities to be aware of in the coming year. From the surprising safety of self-driving cars, to new ways to hack into what many thought were secure systems, Black Hat is the spot for the latest innovations, hacking methods and more. Hack Threat
CSO.webp 2018-09-06 02:30:00 EDR is dead! Long live XDR! (lien direct) Endpoint detection and response (EDR) has been an important technology for security professionals as they attempt to find suspicious activity, or at least traces of it, on endpoints and hosts. Cybersecurity itself is as old as computers, but the EDR segment is still in its infancy with the first solutions dating back only about five years or so.The technology works by monitoring the endpoint and then storing the data in a centralized repository where analysis can be done to detect a threat. Typically, EDR solutions require a software agent to be installed on the host system to provide the data used in monitoring and reporting.EDR has been critical for advanced protection, as more threats are being directed at the user. In fact, one of the industry's leading penetration testers recently told me that he can normally breach an organization within an hour by attacking the user and compromising the endpoint. Also, Windows is still the most widely used operating system in the business world, and many of its internal features are used by threat actors to breach that computer and others. Threat Guideline
CSO.webp 2018-08-29 09:00:00 BrandPost: The Evolving Threat Landscape - Swarmbots, Hivenets, Automation in Malware (lien direct) Over the past several months, the FortiGuard Labs team has been tracking a number of evolving trends related to the FortiGuard 2018 Threat Landscape Predictions article published just before the beginning of the year. This mid-year update provides new details concerning recent advances in some of the techniques and malware tied to those predictions. In particular, the accelerated development of several precursors of Swarmbots and Hivenets are especially worth revisiting. Others include the increased targeting of critical infrastructure, the development of automation in malware exploits, and the use of blockchain technology to anonymize the command and control of botnets. Malware Threat
CSO.webp 2018-08-24 04:45:00 IDG Contributor Network: What your enterprise needs to know about cyber threat intelligence (lien direct) Imagine the following scenario: a large financial institution has heard about recent breaches and thefts that have occurred around the world against similar institutions and wishes to protect itself.These questions may arise: Who is behind these attacks? What is the motive? What is the attack vector? What vulnerabilities were exploited? Is our environment secure enough? What do we need to do?This financial institution should probably talk to their cyber threat intelligence team.Cyber threat intelligence, or sometimes just called threat intelligence (CTI and TI), are increasingly popular terms in the security industry and enterprises in general. You likely have heard them mentioned in conversations with security information and event management (SIEMs), cloud providers, or when buying expensive reports. Threat ★★★★
CSO.webp 2018-07-18 12:25:00 IDG Contributor Network: Are network-based security detection tools going dark? (lien direct) In cybersecurity, there is no shortage of detection tools designed to alert organizations to potential threats.  To over-simplify things, you can broadly categorize these into two camps (although there are others):  Endpoint Detection tools, and Network Detection tools. Each provide unique benefits and a unique perspective upon threats, but each also have their drawbacks.Endpoint detection solutions, like virus scanners or ETDR systems provide visibility upon what happens on the endpoint, regardless of where the endpoint is located.  If the user encounters a threat while at the local coffee shop or at home, the endpoint can continue to be protected.  However, an endpoint solution can only defend systems upon which they are installed.  As most organizations are not heterogenous (I.E. 100% Windows 10, for example) and most endpoint solutions do not have solutions for every platform (I.E. mobile devices and Linux servers may not be covered), endpoint solutions must be augmented with other solutions to get total visibility.  Threat
CSO.webp 2018-07-16 09:05:00 IDG Contributor Network: Redefining threat prediction (lien direct) While the definition of “prediction” might seem like an obvious concept, in the context of security I've found that most people's expectations seldom align with reality. You can blame pop culture if you like. Some misunderstandings surrounding prediction come from movies or television where fiction and fact is blurred. In reality, security analysts cannot predict successful attacks before they happen (yet). Your average security operations center (SOC) does not look like the set of the film, Minority Report.When someone talks about threat prediction in the computer security world, they might imagine automatically and instantly detecting threats. On TV shows, we see words like unknown, motivation, adversary, attack and threat – flashing across a screen, while a tech savvy protagonist breezes through lines of code that are shown crossing the circuits and wires behind the “dark web.” When we talk to some technology providers we hear terms like artificial intelligence, machine learning and analytics, which offer the potential to see into the future. While many of these technologies exist today, our ideas on what they can predict is off-base. Threat
Last update at: 2024-05-16 08:07:56
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter