Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2019-06-27 10:55:04 |
Hackers can take control of Tesla Model 3 navigation. (lien direct) |
Sat Nav spoofing is a growing threat to in-car driver assistance systems and autonomous vehicles, warns Regulus. Security researchers claim to have been able to hack into the navigation system of a Tesla Model 3, getting the vehicle to turn itself on. In early June, security specialists from Regulus conducted a test drive of the […]
|
Hack
Threat
|
Tesla
|
|
 |
2019-06-25 22:15:05 |
Vulnerable open source software posing risk to UK businesses. (lien direct) |
Vulnerable open source software components are posing a security threat to UK firms, according to a report that also shows how best practice, including automation, can reduce the risk. The average UK enterprise downloaded more than 21,000 open source software components with a known vulnerability in the past year alone, data from Sonatype shows. Source: […]
|
Vulnerability
Threat
|
|
|
 |
2019-06-20 14:58:00 |
Stock Photos a Threat to Cybersecurity. (lien direct) |
The cyber-attacks that were once the arsenal of nation states and organised cyber gangs always descend down the supply chain into the hands of the modern criminal, writes Dr Simon Wiseman, CTO, Deep Secure. One devastating technique that is increasing in popularity amongst canny cybercriminals is steganography, where information is concealed in the pixels of […]
|
Threat
|
|
|
 |
2019-06-18 14:24:04 |
89% Of UK Organisational Cybersecurity Risks Are Internal. (lien direct) |
The biggest risk to a British company's cybersecurity is not, as often believed, external hackers and overseas-based virus attacks, but an organisation's own employees. Whether unknowingly or intentional, the actions of those within an organisation have been shown to be the biggest threat to the digital security of a company, according to new research by […]
|
Threat
|
|
|
 |
2019-06-17 14:23:04 |
Industrial Control Systems Security Professionals Say Cyber Security Risk Is At Critical Levels, With People The Biggest Risk. (lien direct) |
People remain the greatest threat to industrial control systems (ICS) and associated networks, according to a new SANS survey focused on better understanding cybersecurity risks to operational technology (OT) systems. More than half of respondents also see the cyber risks to their safe and reliable operations as high or higher than in past years. Three […]
|
Threat
|
|
|
 |
2019-06-14 15:44:05 |
SecBI Amplifies Its Threat Detection Solution With Automated Response. (lien direct) |
SecBI, a disruptive player in cyber threat management, today announced the extension of its agent-less, threat detection solution with automated response. Now security operations centers (SOC) and managed security service providers (MSSPs) can benefit from a comprehensive solution including detection, investigation, and automated response that delivers significant boosts in effectiveness and productivity. Despite the intuitive […]
|
Threat
|
|
|
 |
2019-06-12 15:25:02 |
New Research Exposes The Vulnerabilities Of Smart Home Networks Through Security Cameras And Smart Hubs. (lien direct) |
SAM Seamless Network, the intuitive security system for smart networks, today announced the launch of its Threat Assessment Lab to uncover new attack vectors focusing on IoTs and embedded devices. Amongst its latest research findings, smart home security cameras equate to 47% of the most vulnerable devices followed by smart hubs such as Google Home, […]
|
Threat
|
|
|
 |
2019-06-12 10:54:02 |
Radiohead share 18 hours of unheard music after being held to ransom. (lien direct) |
In a Facebook post, Radiohead wrote, “We got hacked last week — someone stole Thom’s minidisk archive from around the time of OK Computer, and reportedly demanded $150,000 on threat of releasing it.” Rather than paying up, Radiohead posted the hours of unreleased audio on Bandcamp, and it’ll be available for the next 18 days. […]
|
Threat
|
|
|
 |
2019-06-11 11:12:04 |
Vectra Raises $100 Million Led By TCV To Secure The Cloud Using Network Threat Detection And Response. (lien direct) |
Vectra today closed a $100 million round of funding led by TCV, one of the largest growth equity firms backing private and public technology companies. Existing investors also participated in the funding round, bringing the company's total funding to date to more than $200 million. Vectra will use the investment to accelerate global market expansion […]
|
Threat
|
|
|
 |
2019-06-04 09:32:02 |
Business Leaders Admit To Knowledge Gaps And A Lack Of Resources Amid The Growing Threat Of Cyber Attack. (lien direct) |
Today, Nominet releases its report Trouble at the top: The boardroom battle for cyber supremacy, which reveals the attitudes of enterprise boards towards cyber attacks. It highlights a number of knowledge gaps, a lack of resources, and disagreements and discrepancies about who is actually in charge of responding to a breach. The research surveyed more […]
|
Threat
|
|
|
 |
2019-06-03 12:53:01 |
Coordinated Wave of ATO SIM Swapping Attacks. (lien direct) |
Numerous members of the cryptocurrency community have been hit by SIM swapping attacks over the past week, ZDNethas learned, in what appears to be a coordinated wave of attacks. SIM swapping, also known as SIM jacking, is a type of ATO (account take over) attack during which a malicious threat actor uses various techniques (usually […]
|
Threat
|
|
|
 |
2019-05-30 14:18:05 |
Turla Malware discovered attacking European Diplomats. (lien direct) |
Turla, an infamous advanced persistent threat (APT) group, is using new PowerShell-based tools that provide direct, in-memory loading and execution of malware, executables and libraries. Source: Infosecurity Magazine
|
Malware
Threat
|
|
★★★★
|
 |
2019-05-20 14:44:04 |
SecureLink Launches SecureDetect Intelligence To Provide Digital Risk Protection Through Strategic Partnership With Digital Shadows. (lien direct) |
SecureLink, one of Europe's most respected independent cybersecurity and managed service providers, has partnered with Digital Shadows, the leader in digital risk protection to launch SecureDetect Intelligence. This will provide the industry's best cyber threat intelligence and digital risk protection as-a-service, and will be immediately available to European enterprises in countries including the UK, Germany, […]
|
Threat
Guideline
|
|
|
 |
2019-05-16 10:57:04 |
Newsroom section of British Transport Police website hacked. (lien direct) |
Part of the British Transport Police’s (BTP) website has been hacked, the force has confirmed. BTP said it was made aware of “a threat to the newsroom section” of its website – hosted by an external supplier. The main page was unaffected but clicks on the “latest news” link are directed to a Tumblr blog […]
|
Threat
|
|
|
 |
2019-05-14 13:13:02 |
PII belonging to nearly 90% of Panama citizens breached. (lien direct) |
An unprotected Elasticsearch server was found publicly exposing personally identifiable information belonging to nearly 90% of Panama citizens, a security researcher found last week. Bob Diachenko, cyber threat intelligence director at Security Discovery, found the data sitting in a server, where it was publicly available and visible in any browser. The database held 3.4 million […]
|
Threat
|
|
|
 |
2019-04-25 10:29:00 |
Cyber-threats against business are the new black. (lien direct) |
According to the latest cybercrime tactics and techniques report, published by Malwarebytes this morning, threat actors are refocusing their attack efforts on businesses rather than the consumer. Source: SC Magazine UK
|
Threat
|
|
|
 |
2019-04-18 18:08:02 |
The Ping Is The Thing: Popular HTML5 Feature Used To Trick Chinese Mobile Users Into Joining Latest DDoS Attack. (lien direct) |
By Vitaly Simonovich and Dima Bekerman DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced mitigations. We recently investigated a DDoS attack which was […]
|
Threat
|
|
|
 |
2019-04-17 12:51:03 |
Foregenix And Tranwall Partner To Tackle Global ATM Cashout Fraud In The Banking Industry. (lien direct) |
A leading UK cyber security firm has joined forces with an Australian pioneer in payment card control technology to fight against the rise of global ATM Cashout fraud. Australian-based Tranwall’s transaction security software will be offered with Foregenix’s Managed Detection and Response (MDR) and Threat Sweep. Both services provide security visibility of business critical assets […]
|
Threat
Guideline
|
|
|
 |
2019-04-04 12:28:03 |
(Déjà vu) Python-based bot scanner can help criminals spread malware. (lien direct) |
Code and infrastructure from two known malware families have been observed with a new threat named Xwo, which helps operators of the MongoLock ransomware discover unprotected web services reachable over the internet. MongoLock targets unprotected MongoDB databases, wiping them from the server and demanding a ransom to restore them. Xwo is a Python-based bot scanner […]
|
Ransomware
Malware
Threat
|
|
|
 |
2019-04-02 15:34:02 |
Securonix Selected As SC Media Europe 2019 \'Best SIEM Solution\' Award Finalist. (lien direct) |
Securonix, the market leader in next-generation security information and event management (SIEM), has been recognised as a Award finalist in the 'Best SIEM Solution' category for the 2019 SC Awards Europe. Securonix Next-Generation SIEM is reinventing the SIEM market by transforming big data into actionable security intelligence, leveraging machine learning to power advanced threat detection, […]
|
Threat
Guideline
|
|
★★
|
 |
2019-03-26 20:15:05 |
Threat Intelligence Group Completes Global Expansion. (lien direct) |
Cyber security company Foregenix has expanded its Threat Intelligence Group (TIG) in the Asia-Pacific region with the establishment of a new base in Melbourne, Australia. The move will enable the Wiltshire headquartered firm, which has offices in Europe, Africa, SE Asia and North and South America as well as an established base in Sydney, to […]
|
Threat
|
|
★★★
|
 |
2019-03-20 11:29:05 |
Microsoft remains threat actors favourite. (lien direct) |
It should come as no surprise that cybercriminals favored Microsoft Office vulnerabilities in their cyberattacks last year, given the rise in phishing attacks that included rigged Word and Excel Office file attachments. Source: ZDNet
|
Threat
|
|
|
 |
2019-03-19 22:48:01 |
Over Half Of European Organisations Have Suffered Consequences Caused By At Least One Cyberattack In The Last Two Years. (lien direct) |
With the complexity of IT business infrastructure on the rise and the continuously evolving threat landscape, IT decision makers find it increasingly challenging to safeguard their organisations from cyberattacks – more than half of European businesses (54%) have faced at least one cyberattack in the last 24 months which resulted in some sort of disruption […]
|
Threat
|
|
|
 |
2019-03-11 14:48:05 |
Security teams woefully understaffed. (lien direct) |
As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional Research polled on behalf of Tripwire believe it's becoming more difficult to find skilled cybersecurity professionals, and nearly all respondents (93 percent) say the skills required to be a great security […]
|
Threat
|
|
|
 |
2019-03-11 14:47:02 |
Zero-day discovered in Chrome and Windows 7. (lien direct) |
Earlier this week Google released an update for the Chrome web browser that it urged users to ensure was implemented immediately. That was because the Threat Analysis Group at Google had uncovered a critical zero-day vulnerability that was already being exploited in the wild. Now a Google security engineer, Clement Lecigne, has warned that another zero-day vulnerability […]
|
Vulnerability
Threat
|
|
|
 |
2019-03-11 12:20:02 |
Zscaler Releases Semi-Annual Cloud Security Insights Report. (lien direct) |
Zscaler, Inc., the leader in cloud security, announced today the release of its semi-annual 2019 Cloud Security Insights Threat Report – An Analysis of SSL/TLS-based Threats, which examines encrypted traffic across the Zscaler™ cloud from July through December 2018. The report, compiled by the ZscalerTM ThreatLabZ research team, delves into a variety of attacks executed […]
|
Threat
Guideline
|
|
|
 |
2019-03-08 14:55:02 |
(Déjà vu) Russian doll malware targets Pirate Bay users. (lien direct) |
Researchers at Kaspersky Lab have uncovered new malware spreading through Pirate Bay, the popular torrent tracker. The malware, which aims to infect users’ PCs with adware and tools for additional malware installation, has a multi-layered structure. Due to its hidden, seemingly endless stack of functionality, the threat has been named PirateMatryoshka, after the traditional Russian […]
|
Malware
Threat
|
|
|
 |
2019-03-08 14:54:05 |
CYBER ATTACK: 60% of Nigerian businesses attacked in 2018. (lien direct) |
Cybercrime has become the worst threat to every company in the world. It is estimated that about 54 per cent of companies globally, experience at least one cyber attack every year. In Nigeria, it is even a menace that appears to have defied any solution. This is despite the array of solution providers in the […]
|
Threat
|
|
|
 |
2019-03-06 11:42:02 |
Gigamon ATR Examines How Prolific Cyberthreats Traverse Networks And What You Can Do About It. (lien direct) |
Gigamon Inc. (“Gigamon”), the essential element of security infrastructure, providing pervasive visibility to network traffic across physical, virtual, and cloud environments, announced the release of the latest research report from Gigamon Applied Threat Research (ATR), How the Most Prolific Malware Traversed Your Network Without Your Knowledge. Based on observed attack data over the second half […]
|
Malware
Threat
|
|
|
 |
2019-03-05 16:10:05 |
Alert Logic Announces Capabilities For Endpoint, Multi-Cloud, And Dark Web. (lien direct) |
Alert Logic, the SIEMless Threat Management™ company, has today announced that it has added a new extended endpoint protection capability along with other new capabilities for anti-virus integration, log collection and search for Office 365, Microsoft Azure Event Hubs integration, user behaviour anomaly detection for Amazon Web Services (AWS) environments, and dark web scanning. This […]
|
Threat
|
|
|
 |
2019-03-04 10:18:04 |
Deep Secure Launches Content Threat Removal-As-A-Service To Defeat 100% Of Content Threats. (lien direct) |
Deep Secure, the creator of Content Threat Removal technology, today announces the launch of Content Threat Removal-as-a-Service (CTRaaS), a new cloud-based service that will stop organisations from falling victim to cyberattacks concealed in digital content. Cybercriminals are increasingly using content as a vehicle for spreading malware, ransomware and undetectable threats. Rather than detecting and protecting […]
|
Ransomware
Threat
|
|
|
 |
2019-03-01 16:31:02 |
Kaspersky Lab And ThreatConnect Collaborate To Help Customers Get A Complete Picture Of The Threat Landscape. (lien direct) |
Kaspersky Threat Data Feeds are now available for customers through the ThreatConnect Platform. By incorporating these feeds into the threat intelligence framework that they are already using, organisations will get a clearer picture of the threats that pose the most danger to them. Threat Intelligence plays a critical role in corporate cybersecurity, allowing organisations to […]
|
Threat
|
|
|
 |
2019-03-01 16:30:02 |
SentinelOne Collaborates With Intel To Increase Detection Rates Of Cryptominer And Advanced Memory-Based Attacks. (lien direct) |
SentinelOne, the autonomous endpoint protection company, and Intel today announced the integration of hardware-based Intel® Threat Detection Technology (Intel TDT) Accelerated Memory Scanning capabilities with the SentinelOne autonomous endpoint protection console. Independent benchmark testing from Passmark Software validates that SentinelOne's approach, using Intel's silicon to power threat scanning, significantly increases detection rates of memory-based attacks […]
|
Threat
|
|
|
 |
2019-03-01 15:25:04 |
2019 Webroot Threat Report: Forty Percent Of Malicious URLs Found On Good Domains. (lien direct) |
Webroot, the Smarter Cybersecurity® company, revealed the results of the 2019 Webroot Threat Report, showcasing that while tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals. The report is derived from metrics captured and analysed by Webroot's advanced, cloud-based machine learning architecture: the Webroot® Platform. […]
|
Threat
|
|
|
 |
2019-03-01 10:41:04 |
Cybereason Outperforms Its Competitors In The MITRE ATT&CK Evaluations. (lien direct) |
The Company's Cyber Defense Platform's Automated Threat Detection Delivers the Most Coverage Across the Entire MITRE ATT&CK Framework, the Most Real-Time Alerts and the Most Correlation Cybereason, creators of the leading Cyber Defense Platform, today announced it has outperformed every competitor as a result of the MITRE ATT&CK Evaluations, released earlier today. The company's Cyber […]
|
Threat
Guideline
|
|
|
 |
2019-02-28 16:28:00 |
Radiflow Incorporates Dynamic Vulnerability Assessment Scoring Into Its Industrial Threat Detection Solution. (lien direct) |
Radiflow, a leading provider of industrial cybersecurity solutions for industrial automation networks, today announced that the company has added dynamic vulnerability assessment scoring capabilities in the new release of its iSID industrial threat detection solution. The current practices for risk assessments and security remediations employed by industrial enterprises and critical infrastructure operators generally rely on […]
|
Vulnerability
Threat
Guideline
|
|
|
 |
2019-02-28 15:15:04 |
Threat Spotlight: Barracuda Study Finds 1 In 10 Spear Phishing Emails Are Sextortion. (lien direct) |
Sextortion scams have increased in frequency and scope since we first highlighted this type of attack in our October Threat Spotlight. Previously, sextortion scams were used as part of large-scale spam campaigns, but now many of these attacks are getting more sophisticated and bypassing email gateways. We analyzed spear phishing attacks targeted at Barracuda customers […]
|
Spam
Threat
|
|
|
 |
2019-02-28 11:46:05 |
Persistent Attackers Rarely Use Bespoke Malware. (lien direct) |
State-sponsored attackers continued to be extremely active in 2018 with major groups from at least a dozen countries involved in operations targeting government, business, and civilian targets throughout the year, according to analyses by two security firms. While advanced persistent threat (APT) groups have, in the past, often used custom frameworks to help compromise systems […]
|
Threat
|
|
|
 |
2019-02-27 15:28:00 |
The Growing Threat Of IP Spoofing. (lien direct) |
It's not a threat that everyone has heard of, like phishing or a computer virus, but IP spoofing is a rapidly accelerating problem. In the online gaming and gambling industries, IP spoofing attacks have increased by 257% year-on-year, making them both the fastest growing and the most prevalent cyber attack type in that area. They're […]
|
Threat
|
|
|
 |
2019-02-22 11:54:00 |
New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats. (lien direct) |
With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. It aggregates and evaluates disconnected data […]
|
Threat
|
|
|
 |
2019-02-20 11:06:00 |
Microsoft expands its cyber security services in Europe. (lien direct) |
Microsoft has expanded the reach of its cyber security service for political organisations in Europe, after detecting a fresh wave of attacks from Russian hackers. The firm’s vice president for customer security and trust Tom Burt said Microsoft’s Threat Intelligence Centre (MSTIC) had discovered attacks on employees of the German Council of Foreign Relations, and European […]
|
Threat
|
|
|
 |
2019-02-11 15:37:01 |
Cyberattacks in Top Three Threats. (lien direct) |
Climate change increasingly ranks as the world's most pressing security threat, with terrorism and cyberattacks also topping the list, according to a new survey by the Washington-based Pew Research Center. In a poll of 26 countries, 13 considered the warming planet the number one concern. This was followed by the threat of Islamic State in […]
|
Threat
|
|
|
 |
2019-02-08 10:19:03 |
Banking Trojan use increases as ransomware experiences decline. (lien direct) |
Ransomware accounted for one tenth of 1% of all malicious email content in Q4, according to a new threat report from Proofpoint. It's Q4 threat report found that banking trojans accounted for 56% of all malicious payloads in email in Q4, while remote access trojans (RATs) accounted for 8.4%. Proofpoint claimed that this marked a […]
|
Ransomware
Threat
|
|
|
 |
2019-01-31 10:29:01 |
(Déjà vu) FBI Maps and Further Disrupts North Korean Jonap Botnet. (lien direct) |
The United States Department of Justice (DoJ) announced its effort to “map and further disrupt” a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade.Dubbed Joanap, the botnet is believed to be part of “Hidden Cobra”-an Advanced Persistent Threat (APT) actors’ group often known as […]
|
Threat
Medical
|
APT 38
|
|
 |
2019-01-28 09:27:04 |
Vulnerabilities in IoT applications make attacks more likely. (lien direct) |
A study by researchers at Barracuda Networks gas illustrated the growing threat posed by IoT credential compromise. Vulnerabilities can be exploited to steal user credentials and compromise devices. The Barracuda research team identified multiple vulnerabilities in camera's web and mobile applications. The research team recommended that IoT products are scored based on their security level. […]
|
Threat
|
|
|
 |
2019-01-24 15:03:00 |
Threat Spotlight: IoT Application Vulnerabilities Leave IOT Devices Open To Attack. (lien direct) |
IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality. So, your refrigerator that sends […]
|
Threat
|
|
|
 |
2019-01-24 14:56:03 |
Something In Common: Two Notorious Russian Speaking Hacking Groups Found Sharing Infrastructure With Each Other. (lien direct) |
Kaspersky Lab experts have identified an overlap in cyberattacks between two infamous threat actors, GreyEnergy – which is believed to be a successor of BlackEnergy – and the Sofacy cyberespionage group. Both actors used the same servers at the same time, with, however, a different purpose. BlackEnergy and Sofacy hacking groups are considered to be […]
|
Threat
|
|
|
 |
2019-01-22 15:11:05 |
Why Executive-Protection Teams Need Finished Intelligence. (lien direct) |
By Glenn Lemons, Senior Director of Customer Success, Flashpoint For executive protection teams tasked with safeguarding business leaders in an increasingly complex threat landscape, having rapid access to relevant information is essential. But as more threat actors shift operations online-and often to illicit, exclusive communities and platforms-many of the insights most useful to executive protection […]
|
Threat
Guideline
|
|
|
 |
2019-01-21 16:20:05 |
SolutionsPT To Host Cryptomining Webinar For OT Professionals. (lien direct) |
Industrial IT software provider SolutionsPT will host a free webinar exploring the evolving cyber security threat posed by Cryptomining infections and how they can be prevented, on Thursday, February 21st. Designed for Operational Technology (OT) professionals, the Introduction to Cryptomining webinar will examine the specific threat Cryptomining poses to OT environments and discuss the solutions […]
|
Threat
|
|
|
 |
2019-01-21 16:20:05 |
ExtraHop Turns Security Analysts Into Threat Experts With Reveal(x) Winter 2019. (lien direct) |
ExtraHop, provider of enterprise cyber analytics from the inside out, today announced new capabilities designed to help Security Operations Center (SOC) and Network Operations Center (NOC) teams identify and safeguard critical assets, rapidly detect late-stage and insider threats, and transform security analysts into threat experts with streamlined investigation workflows. Demand for business agility and uptime […]
|
Threat
|
|
|