Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2020-11-17 10:35:00 |
An Inside Look at an Account Takeover (lien direct) |
AI threat find: Phishing attack slips through email gateway and leads to large-scale compromise. |
Threat
Guideline
|
|
|
 |
2020-02-05 15:30:00 |
Emotet Preps for Tax Season with New Phishing Campaign (lien direct) |
Malicious emails in a new attack campaign contain links and attachments claiming to lead victims to W-9 forms. |
Guideline
|
|
|
 |
2020-01-07 14:00:00 |
The Discovery and Implications of \'MDB Leaker\' (lien direct) |
The "MDB Leaker" vulnerability in the Microsoft Access Database could lead to a memory leak if left unpatched. |
Vulnerability
Guideline
|
|
|
 |
2019-11-18 17:30:00 |
Windows Hello for Business Opens Door to New Attack Vectors (lien direct) |
Researchers exploring Windows Hello for Business found an Active Directory backdoor and other attack vectors that could lead to privilege escalation. |
Guideline
|
|
|
 |
2019-10-31 16:20:00 |
Chinese Cyber Espionage Group Steals SMS Messages via Telco Networks (lien direct) |
APT41's new campaign is latest to highlight trend by Chinese threat groups to attack upstream service providers as a way to reach its intended targets, FireEye says. |
Threat
Guideline
|
APT 41
|
|
 |
2019-09-18 11:55:00 |
One Arrested in Ecuador\'s Mega Data Leak (lien direct) |
Officials arrest a leader of consulting firm Novaestrat, which owned an unprotected server that exposed 20.8 million personal records. |
Guideline
|
|
|
 |
2019-09-11 10:00:00 |
Firmware: A New Attack Vector Requiring Industry Leadership (lien direct) |
It's time for cybersecurity manufacturers and solution providers to step up and show leadership in addressing firmware security. Read why and how. |
Guideline
|
|
|
 |
2019-07-16 17:00:00 |
Security Snapshot: OS, Authentication, Browser & Cloud Trends (lien direct) |
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices. |
Guideline
|
|
|
 |
2019-05-15 15:30:00 |
Introducing the Digital Transformation Architect (lien direct) |
Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams. |
Guideline
|
|
|
 |
2019-03-05 10:30:00 |
Artificial Intelligence: The Terminator of Malware (lien direct) |
Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future? |
Malware
Guideline
|
|
|
 |
2018-11-28 14:30:00 |
Data Breach Threats Bigger Than Ever (lien direct) |
A quarter of IT and security leaders expect a major data breach in the next year. |
Data Breach
Guideline
|
|
|
 |
2018-11-14 14:45:00 |
Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues (lien direct) |
Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data - and are fearful of a near-term breach of critical infrastructure. |
Guideline
|
|
|
 |
2018-11-01 11:30:00 |
FIFA Reveals Second Hack (lien direct) |
Successful phishing campaign leads attackers to confidential information of world soccer's governing body. |
Hack
Guideline
|
|
|
 |
2018-04-19 14:45:00 |
Should CISOs Be Hackers? (lien direct) |
Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals - including CISOs and other security team leaders - can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.
|
Guideline
|
|
|
 |
2018-02-22 10:30:00 |
Anatomy of an Attack on the Industrial IoT (lien direct) |
How cyber vulnerabilities on sensors can lead to production outage and financial loss. |
Guideline
|
|
|
 |
2017-11-28 10:30:00 |
The Looming War of Good AI vs. Bad AI (lien direct) |
The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.
|
Guideline
|
|
|
 |
2017-11-27 16:40:00 |
Uber\'s Security Slip-ups: What Went Wrong (lien direct) |
The ride-sharing company's decisions leading to a 2016 data breach and its handling of the incident should serve as a cautionary tale for enterprises facing a breach. |
Guideline
|
Uber
|
|
 |
2017-09-08 12:15:00 |
New Android \'Toast\' Vuln Makes Overlay Attacks Easier (lien direct) |
The vast majority of Android devices are at risk of a 'Toast' overlay attack that builds on Cloak and Dagger exploits. The bug could lead to remote control of the device unless Google's latest security patch is applied. |
Guideline
|
|
|
 |
2017-04-24 16:40:00 |
Macron Targeted by Russian Cyber Spies (lien direct) |
France's leading presidential candidate Emmanuel Macron's campaign reportedly is being targeted by hackers ties to Russia's military intelligence arm GRU. |
Guideline
|
|
|
 |
2017-03-23 09:15:00 |
Russian Man Pleads Guilty for Role in Citadel Malware Attacks (lien direct) |
Russian national Mark Vartanyan pleads guilty in US federal court following his December 2016 extradition from Norway. |
Guideline
|
|
|
 |
2017-03-16 14:30:00 |
In Cyber, Who Do We Trust to Protect the Business? (lien direct) |
If business leaders and directors continue to view cybersecurity as mainly a matter for the IT department, they will leave their companies exposed to significant risks. |
Guideline
|
|
|
 |
2017-02-14 10:30:00 |
Why Identity Has Become A Top Concern For CSOs (lien direct) |
Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the fight against cyber adversaries. |
Guideline
|
|
|
 |
2017-01-27 16:15:00 |
7 Tips For Getting Your Security Budget Approved (lien direct) |
How to have a productive conversation with business leaders and get your security budget approved. |
Guideline
|
|
|
 |
2016-12-27 08:00:00 |
Greatest Hits Of 2016: Readers\' Picks For The Years\' Best Commentary (lien direct) |
Here's what topped the Dark Reading page-view charts from the security industry's brightest minds, coolest rock stars, and up-and-coming leaders. |
Guideline
|
|
|
 |
2016-12-20 10:10:00 |
44% Of Companies Miss Breach Reporting Deadlines (lien direct) |
Balabit research on security investigation says organizations lack of understanding lead to delay in breach probe. |
Guideline
|
|
|
 |
2016-12-16 11:00:00 |
How To Find, Hire The Next-Gen CISO (lien direct) |
Joyce Brocaglia of Alta Associates and the Executive Women's Forum talks about how to identify the perfect leader for your cybersecurity team, even if "security" isn't on their resume. |
Guideline
|
|
|
 |
2016-12-14 10:00:00 |
Vendor Accountability & The Security Supply Chain (lien direct) |
A large majority of security leaders say they would switch to suppliers that offer product and service guarantees, according to a new survey.
|
Guideline
|
|
|
 |
2016-12-01 09:34:00 |
Microsoft \'Father Of SDL\' Named To Top Post At SAFECode (lien direct) |
Steve Lipner, the former Microsoft security leader credited with spearheading its security development lifecycle (SDL) initiative, takes on a new role as executive director at SAFECode. |
Guideline
|
|
|
 |
2016-11-28 14:00:00 |
Q&A: SonicWall CEO Talks Rise Of Ransomware, IoT (lien direct) |
Bill Conner discusses security risks at top of mind as the newly appointed leader of SonicWall, a company becoming independent for the second time. |
Guideline
|
|
|
 |
2016-11-17 13:00:00 |
Insider Threat: The Domestic Cyber Terrorist (lien direct) |
It is dangerously naive for business and government leaders to dismiss the risk of radicalized privileged users inside our critical industries. |
Guideline
|
|
|
 |
2016-10-19 11:00:00 |
Malvertising Trends: Don\'t Talk Ad Standards Without Ad Security (lien direct) |
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly - and what online publishers and security leaders need to do about it. |
Guideline
|
|
|
 |
2016-10-05 11:13:00 |
Cybersecurity Economics In Government -- Is Funding The Real Problem? (lien direct) |
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process. |
Guideline
|
|
|
 |
2016-09-28 09:02:00 |
Improving The Security Conversation For CIOs, CISOs, & Board Members (lien direct) |
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts. |
Guideline
|
|
|
 |
2016-09-26 13:10:00 |
Cyber Risk Among Top Concerns For Business Leaders: Study (lien direct) |
More than 50% of business leaders surveyed in the Travelers Risk Index report cyber, computer, and technology risks are among their top concerns. |
Guideline
|
|
|
 |
2016-09-13 10:50:00 |
Security Certifications Highly Valued But Not Always Verified (lien direct) |
New study shows IT leaders place the greatest value on cybersecurity certifications, but nearly half rarely confirm legitimacy of new hires' credentials. |
Guideline
|
|
|
 |
2016-09-02 10:00:00 |
\'Guccifer\' Gets 52-Month Jail Term (lien direct) |
The Romanian hacker pleaded guilty to hacking and compromise of personal details of around 100 high-profile Americans. |
Guideline
|
|
|