Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2023-01-30 20:28:00 |
The Threat from Within: 71% of Business Leaders Surveyed Think Next Cybersecurity Breach Will Come from the Inside (lien direct) |
|
Threat
|
|
★★
|
|
2023-01-25 16:22:00 |
ThreatConnect Extends Threat Intelligence Platform to Enable Threat Intelligence Operations (TI Ops) (lien direct) |
|
Threat
|
|
★★
|
|
2023-01-25 15:38:00 |
BlackBerry\'s Inaugural Quarterly Threat Intelligence Report Reveals Threat Actors Launch One Malicious Threat Every Minute (lien direct) |
Report identifies 1.75m cyberattacks were stopped by BlackBerry in the last 90 days. |
Threat
|
|
★★
|
|
2023-01-25 00:34:00 |
Skyhawk Security Launches Multicloud Runtime Threat Detection and Response Platform (lien direct) |
Skyhawk Synthesis extends cloud security misconfiguration detection across multiple clouds, the company says - throwing cloud security posture management in for free. |
Threat
|
|
★★
|
|
2023-01-24 15:59:32 |
Microsoft to Block Excel Add-ins to Stop Office Exploits (lien direct) |
The company will block the configuration files, which interact with Web applications - since threat actors increasingly use the capability to install malicious code. |
Threat
|
|
★★★★★
|
|
2023-01-23 21:07:00 |
Organizations Likely to Experience Ransomware Threat in the Next 24 Months, According to Info-Tech Research Group (lien direct) |
Security leaders must build resiliency against these complex attacks immediately. |
Ransomware
Threat
Guideline
|
|
★★
|
|
2023-01-23 15:00:00 |
Hunting Insider Threats on the Dark Web (lien direct) |
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats. |
Threat
|
|
★★
|
|
2023-01-20 21:37:22 |
T-Mobile Breached Again, This Time Exposing 37M Customers\' Data (lien direct) |
This time around, weak API security allowed a threat actor to access account information, the mobile phone giant reported. |
Threat
|
|
★
|
|
2023-01-20 21:18:04 |
Ransomware Profits Decline as Victims Dig In, Refuse to Pay (lien direct) |
Two new reports show ransomware revenues for threat actors dropped sharply in 2022 as more victims ignored ransom demands. |
Ransomware
Threat
|
|
★
|
|
2023-01-18 17:10:00 |
ICS Confronted by Attackers Armed With New Motives, Tactics, and Malware (lien direct) |
Threat actors are diversifying across all aspects to attack critical infrastructure, muddying the threat landscape, and forcing industrial organizations to rethink their security. |
Malware
Threat
Industrial
|
|
★★
|
|
2023-01-18 15:15:00 |
Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers (lien direct) |
The integration provides crucial protection for businesses' most vulnerable departments - help desks and customer support teams - preventing the most advanced threats sent by online users. |
Threat
|
|
★★
|
|
2023-01-18 15:00:00 |
Cybersecurity and the Myth of Quiet Quitting (lien direct) |
People are working harder than ever, but they're not happy about it - and the insider threat is all too real. |
Threat
|
|
★★
|
|
2023-01-17 22:08:00 |
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises (lien direct) |
A rapid increase in the number of operators in the space - the "locksmiths" of the cyber underground - has made it substantially cheaper for cybercriminals to buy access to target networks. |
Threat
|
|
★★★
|
|
2023-01-13 18:03:04 |
CircleCI, LastPass, Okta, and Slack: Cyberattackers Pivot to Target Core Enterprise Tools (lien direct) |
High-profile software provider compromises in the past few months show that threat actors are actively targeting the services underpinning corporate infrastructure. Here's what to do about it. |
Threat
|
LastPass
|
★★★★
|
|
2023-01-13 15:00:00 |
Fast-Track Secure Development Using Lite Threat Modeling (lien direct) |
Establish clear and consistent processes and standards to scale lite threat modeling's streamlined approach across your organization. |
Threat
|
|
★★
|
|
2023-01-10 15:30:00 |
Vade Releases Advanced Threat Intel & Investigation Capabilities (lien direct) |
New Add-On Empowers SOCs and MSPs to Automate & Orchestrate Incident Response for Microsoft 365. |
Threat
|
|
★★★
|
|
2023-01-10 15:04:00 |
Netskope Threat Research: Malware-Delivering Cloud Apps Nearly Tripled in 2022 (lien direct) |
401 distinct cloud apps shown to deliver malware; Microsoft OneDrive delivered 30% of all cloud malware downloads. |
Malware
Threat
|
|
★★★
|
|
2023-01-06 19:02:34 |
CISOs Are Focused on These 3 Trends. Are You? (lien direct) |
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy. |
Threat
|
|
★★
|
|
2023-01-06 18:46:00 |
PurpleUrchin Gang Embraces DevOps In Massive Cloud Malware Campaign (lien direct) |
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger. |
Malware
Threat
|
|
★★★
|
|
2023-01-05 18:02:00 |
Bluebottle Continues Bank Heist Assault With Signed Malware (lien direct) |
The financially motivated threat group, also known as OPERA1ER, demonstrated an evolution in tactics in its compromise of three Francophone financial institutions in Africa, likely adding to its $11 million to-date haul. |
Malware
Threat
|
|
★★★
|
|
2023-01-05 16:09:51 |
Threat Actors Evade Detection Through Geofencing & Fingerprinting (lien direct) |
Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game. |
Threat
|
|
★★★★
|
|
2022-12-27 15:00:00 |
The Threat of Predictive Policing to Data Privacy and Personal Liberty (lien direct) |
Inaccurate information from data brokers can damage careers and reputations. It's time for US privacy laws to change how law enforcement and legal agencies obtain and act on data. |
Threat
|
|
★★
|
|
2022-12-22 21:23:00 |
New Brand of Security Threats Surface in the Cloud (lien direct) |
Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach. |
Threat
|
|
★★★
|
|
2022-12-22 15:00:00 |
Threat Modeling in the Age of OpenAI\'s Chatbot (lien direct) |
New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work. |
Threat
|
|
★★★
|
|
2022-12-22 14:03:02 |
Zerobot Adds Brute Force, DDoS to Its IoT Attack Arsenal (lien direct) |
Threat actors continue to evolve the malicious botnet, which has also added a list of new vulnerabilities it can use to target devices. |
Threat
|
|
★★★
|
|
2022-12-21 15:51:30 |
How to Run Kubernetes More Securely (lien direct) |
The open source container tool is quite popular among developers - and threat actors. Here are a few ways DevOps teams can take control. |
Tool
Threat
|
Uber
|
★★
|
|
2022-12-20 14:41:52 |
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range (lien direct) |
Threat actors can take over victims' cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks. |
Threat
|
|
★★
|
|
2022-12-19 21:00:00 |
Threat Intelligence Through Web Scraping (lien direct) |
Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks. |
Threat
|
|
★★
|
|
2022-12-19 14:00:00 |
Holiday Spam, Phishing Campaigns Challenge Retailers (lien direct) |
Revived levels of holiday spending have caught the eye of threat actors who exploit consumer behaviors and prey on the surge of online payments and digital activities during the holidays. |
Threat
|
|
★★
|
|
2022-12-16 20:50:00 |
New Botnet Targeting Minecraft Servers Poses Potential Enterprise Threat (lien direct) |
Microsoft warns enterprises should pay attention to a new botnet used to launch DDoS attacks on private Minecraft Java servers. |
Threat
|
|
★★★
|
|
2022-12-15 16:20:20 |
Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps (lien direct) |
Money-lending apps built using the Flutter software development kit hide a predatory spyware threat and highlight a growing trend of using personal data for blackmail. |
Malware
Threat
Prediction
|
|
★★★
|
|
2022-12-14 22:00:20 |
NSA Slices Up 5G Mobile Security Risks (lien direct) |
The feds' mobile service provider guidance details cybersecurity threat vectors associated with 5G network slicing. |
Threat
|
|
★★
|
|
2022-12-14 21:20:00 |
Cybereason Warns Global Organizations Against Destructive Ransomware Attacks From Black Basta Gang (lien direct) |
The Royal Ransomware Group has emerged as a threat to companies in 2022 and they have carried out dozens of successful attacks on global companies. Cybereason suggests that companies raise their awareness of this potential pending threat. |
Ransomware
Threat
|
|
★★
|
|
2022-12-14 15:06:25 |
Automated Cyber Campaign Creates Masses of Bogus Software Building Blocks (lien direct) |
The proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains. |
Threat
|
|
★★★
|
|
2022-10-12 13:30:55 |
InterVision Announces Study Identifying Ransomware as No. 1 Threat to Business Longevity (lien direct) |
InterVision releases a new website focused on the customer experience, making B2B cybersecurity purchasing decisions easier. |
Ransomware
Threat
|
|
|
|
2022-10-07 22:52:00 |
Credential Harvesting Is Retail Industry\'s Top Threat (lien direct) |
Why bother with new tactics and exploits when the old tricks are still effective? |
Threat
|
|
|
|
2022-10-05 17:00:00 |
Giving Away the Keys to Your Backups? Here\'s How to Keep Out Hackers (lien direct) |
As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls. |
Threat
|
|
|
|
2022-10-05 14:00:00 |
Why Don\'t CISOs Trust Their Employees? (lien direct) |
Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough. |
Threat
|
|
|
|
2022-10-05 14:00:00 |
7 Practical Considerations for Effective Threat Intelligence (lien direct) |
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help. |
Threat
|
|
|
|
2022-10-04 14:37:39 |
Steam Gaming Phish Showcases Browser-in-Browser Threat (lien direct) |
Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses. |
Threat
|
|
|
|
2022-09-30 20:00:00 |
The Top 4 Mistakes in Security Programs to Avoid (lien direct) |
Overlooking even just a single security threat can severely erode a company's community and consumer confidence, tarnish reputation and brand, negatively impact corporate valuations, provide competitors with an advantage, and create unwanted scrutiny. |
Threat
|
|
|
|
2022-09-30 19:10:40 |
Reshaping the Threat Landscape: Deepfake Cyberattacks Are Here (lien direct) |
It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones. |
Threat
|
|
|
|
2022-09-29 19:26:44 |
Dangerous New Attack Technique Compromising VMware ESXi Hypervisors (lien direct) |
China-based threat actor used poisoned vSphere Installation Bundles to deliver multiple backdoors on systems, security vendor says. |
Threat
|
|
|
|
2022-09-27 15:05:03 |
Adversaries Continue Cyberattacks with Greater Precision and Innovative Attack Methods According to NETSCOUT Report (lien direct) |
TCP-based, DNS water-torture, and carpet-bombing attacks dominate the DDoS threat landscape, while Ireland, India, Taiwan, and Finland are battered by DDoS attacks resulting from the Russia/Ukraine war. |
Threat
|
|
|
|
2022-09-26 16:01:29 |
Cyber Threat Alliance Extends Membership to 6+ Leading Cybersecurity Companies (lien direct) |
CTA now has 36 members headquartered in 11 countries who follow cyber activities across the world, showing cybersecurity industry members realize the value in collaboration. |
Threat
|
|
|
|
2022-09-22 20:48:20 |
Developer Leaks LockBit 3.0 Ransomware-Builder Code (lien direct) |
Code could allow other attackers to develop copycat versions of the malware, but it could help researchers understand the threat better as well. |
Threat
|
|
|
|
2022-09-20 20:33:17 |
ChromeLoader Malware Evolves into Prevalent, More Dangerous Cyber Threat (lien direct) |
Microsoft and VMware are warning that the malware, which first surfaced as a browser-hijacking credential stealer, is now being used to drop ransomware, steal data, and crash systems at enterprises. |
Malware
Threat
|
|
|
|
2022-09-20 17:00:00 |
How to Dodge New Ransomware Tactics (lien direct) |
The evolving tactics increase the threat of ransomware operators, but there are steps organizations can take to protect themselves. |
Ransomware
Threat
|
|
|
|
2022-09-19 18:12:03 |
Cyberattackers Make Waves in Hotel Swimming Pool Controls (lien direct) |
Pool controllers exposed to the Internet with default passwords let threat actors tweak pool pH levels, and potentially more. |
Threat
|
|
|
|
2022-09-15 14:40:15 |
Unflagging Iranian Threat Activity Spurs Warnings, Indictments From US Government (lien direct) |
Authorities are cracking down on persistent cybercriminal attacks from APTs associated with Iran's Islamic Revolutionary Guard Corps. |
Threat
|
|
|