What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.png 2019-03-25 16:10:00 Attackers Compromise ASUS Software Update Servers to Distribute Malware (lien direct)

ShadowHammer campaign latest to highlight dangers of supply chain attacks.

DarkReading.png 2019-03-21 13:10:00 Police Federation of England and Wales Suffers Apparent Ransomware Attack (lien direct)

National Cyber Security Centre and National Crime Agency investigate random attack that locked down the association\'s data and deleted backups.

DarkReading.png 2019-03-19 16:30:00 Microsoft Office Dominates Most Exploited List (lien direct)

Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.

DarkReading.png 2019-03-19 16:25:00 DDoS Attack Size Drops 85% in Q4 2018 (lien direct)

The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.

DarkReading.png 2019-03-19 14:30:00 The Case of the Missing Data (lien direct)

The latest twist in the Equifax breach has serious implications for organizations.

DarkReading.png 2019-03-19 13:20:00 Norsk Hydro Shuts Plants Amid Ransomware Attack (lien direct)

The cyberattack, first detected on Monday night, has shut down Norsk\'s entire global network.

DarkReading.png 2019-03-19 08:30:00 New Mirai Version Targets Business IoT Devices (lien direct)

The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.

DarkReading.png 2019-03-15 11:00:00 Proof-of-Concept Tracking System Finds RATs Worldwide (lien direct)

Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

DarkReading.png 2019-03-14 20:45:00 Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites (lien direct)

New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.

DarkReading.png 2019-03-14 18:45:00 Ransomware\'s New Normal (lien direct)

GandCrab\'s evolution underscores a shift in ransomware attack methods.

DarkReading.png 2019-03-14 12:30:00 US Prosecutors Investigate Facebook\'s Data-Sharing Deals (lien direct)

The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.

DarkReading.png 2019-03-13 18:40:00 New Malware Shows Marketing Polish (lien direct)

A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.

DarkReading.png 2019-03-13 14:30:00 IoT Anomaly Detection 101: Data Science to Predict the Unexpected (lien direct)

Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.

DarkReading.png 2019-03-13 14:15:00 \'SimBad\': Android Adware Hits 210 Apps with 150M Downloads (lien direct)

Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.

DarkReading.png 2019-03-12 17:55:00 Citrix Breach Underscores Password Perils (lien direct)

Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor\'s network.

DarkReading.png 2019-03-12 17:10:00 Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack (lien direct)

Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.

DarkReading.png 2019-03-12 13:00:00 Cybercriminals Think Small to Earn Big (lien direct)

As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.

DarkReading.png 2019-03-08 17:30:00 Citrix Hacked by \'International Cybercriminals\' (lien direct)

FBI informed Citrix this week of a data breach that appears to have begun with a \'password spraying\' attack to steal weak credentials to access the company\'s network.

DarkReading.png 2019-03-07 18:10:00 Phishing Attacks Evolve as Detection & Response Capabilities Improve (lien direct)

Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.

DarkReading.png 2019-03-07 15:50:00 IoT Anomaly Detection 101: Data Science to Predict the Unexpected (lien direct)

Yes! You can predict the chance of a mechanical failure or security breach before it happens . Here\'s how.

DarkReading.png 2019-03-07 10:30:00 4 Ways At-Work Apps Are Vulnerable to Attack (lien direct)

Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

DarkReading.png 2019-03-06 16:30:00 New Threat Group Using Old Technique to Run Custom Malware (lien direct)

Whitefly is exploiting DLL hijacking with considerable success against organizations since at least 2017, Symantec says.

DarkReading.png 2019-03-05 14:15:00 Lazarus Research Highlights Threat from North Korea (lien direct)

A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.

DarkReading.png 2019-03-05 10:30:00 Artificial Intelligence: The Terminator of Malware (lien direct)

Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?

DarkReading.png 2019-03-05 07:00:00 Incident Response: Having a Plan Isn\'t Enough (lien direct)

Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk.

DarkReading.png 2019-03-01 07:30:00 Encryption Offers Safe Haven for Criminals and Malware (lien direct)

The same encryption that secures private enterprise data also provides security to malware authors and criminal networks.

DarkReading.png 2019-02-28 13:35:00 Data Leak Exposes Dow Jones Watchlist Database (lien direct)

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.

DarkReading.png 2019-02-28 13:35:00 Dow Jones Leak Exposes Watchlist Database (lien direct)

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.

DarkReading.png 2019-02-27 16:45:00 Persistent Attackers Rarely Use Bespoke Malware (lien direct)

Study of the Bronze Union group-also known as APT27 or Emissary Panda-underscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools.

DarkReading.png 2019-02-26 19:00:00 Researchers Build Framework for Browser-Based Botnets (lien direct)

HTML5 used to build persistent malware on victims\' computers.

DarkReading.png 2019-02-26 16:40:00 Social Media Platforms Double as Major Malware Distribution Centers (lien direct)

Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses.

DarkReading.png 2019-02-26 14:46:00 \'Cloudborne\': Bare-Metal Cloud Servers Vulnerable to Attack (lien direct)

Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer.

DarkReading.png 2019-02-25 14:00:00 Russian Hacker Pleads Guilty to Bank Fraud (lien direct)

The hacker ran a botnet that spread \'NeverQuest\' malware for three years and collected millions of banking credentials.

DarkReading.png 2019-02-25 13:15:00 TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised (lien direct)

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

DarkReading.png 2019-02-25 13:15:00 TurboTax Hit with Cyberattack, Tax Returns Compromised (lien direct)

Officials report an unauthorized party obtained tax return data by using credentials obtained from an outside source.

DarkReading.png 2019-02-22 15:15:00 Lessons From the War on Malicious Mobile Apps (lien direct)

Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.

DarkReading.png 2019-02-22 15:10:00 New Malware Campaign Targets Job Seekers (lien direct)

LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.

DarkReading.png 2019-02-22 11:20:00 New Legislation Builds on California Data Breach Law (lien direct)

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

DarkReading.png 2019-02-21 17:50:00 Attack Campaign Experiments with Rapid Changes in Email Lure Content (lien direct)

It\'s like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.

DarkReading.png 2019-02-21 14:30:00 Why Cybersecurity Burnout Is Real (and What to Do About It) (lien direct)

The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here\'s how to turn down the pressure.

DarkReading.png 2019-02-21 13:20:00 Cyber Extortionists Can Earn $360,000 a Year (lien direct)

Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.

DarkReading.png 2019-02-20 15:30:00 POS Vendor Announces January Data Breach (lien direct)

More than 120 restaurants were affected by an incident that exposed customer credit card information.

DarkReading.png 2019-02-19 11:25:00 Breach in Stanford System Exposes Student Records (lien direct)

A wide variety of data was visible through the vulnerability.

DarkReading.png 2019-02-14 15:45:00 Coffee Meets Bagel Confirms Hack on Valentine\'s Day (lien direct)

The dating app says users\' account data may have been obtained by an unauthorized party.

DarkReading.png 2019-02-14 09:00:00 Learn New Malware-Fighting Tools & Techniques at Black Hat Asia (lien direct)

There\'s no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.

DarkReading.png 2019-02-13 18:10:00 2018 Was Second-Most Active Year for Data Breaches (lien direct)

Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.

DarkReading.png 2019-02-13 17:30:00 Windows Executable Masks Mac Malware (lien direct)

A new strain of MacOS malware hides inside a Windows executable to avoid detection.

DarkReading.png 2019-02-12 17:55:00 Up to 100,000 Reported Affected in Landmark White Data Breach (lien direct)

Australian property valuation firm Landmark White exposed files containing personal data and property valuation details.

DarkReading.png 2019-02-11 20:30:00 Client-Side DNS Attack Emerges From Academic Research (lien direct)
DarkReading.png 2019-02-11 16:00:00 New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices (lien direct)

Adantium, developed by Google, brings communication encryption to bear on storage security.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter