What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
globalsecuritymag.png 2019-03-19 13:43:01 Le malware Nymaim décodé par Proofpoint (lien direct)

Bien que le malware Nymaim soit régulièrement apparu en Europe et dans des campagnes globales depuis 2013, il était jusqu\'à présent peu documenté, et son origine ainsi que son modèle économique restaient flous pour la plupart des individus qui y étaient confrontés. Aujourd\'hui, Proofpoint propose un décodage de ce malware, pour mieux comprendre son fonctionnement, unique en son genre. La configuration de Nymaim apparaît en effet singulière, puisqu\'il s\'agit d\'un fichier de données compilé de type (...) - Malwares

DarkReading.png 2019-03-19 13:20:00 Norsk Hydro Shuts Plants Amid Ransomware Attack (lien direct)

The cyberattack, first detected on Monday night, has shut down Norsk\'s entire global network.

grahamcluley.png 2019-03-19 13:06:05 Aluminium plants hit by cyber-attack, global company turns to manual operations (lien direct)
Aluminium plants hit by cyber-attack, global company turns to manual operations

Norsk Hydro, one of the world\'s largest producers of aluminium, says that it is battling an “extensive cyber-attack” that first hit its systems on Monday evening and then escalated overnight.

Read more in my article on the Hot for Security blog.

Checkpoint.png 2019-03-19 13:00:04 Check Point Forensic Files: A New Monero CryptoMiner Campaign (lien direct)

By Marcel Afrahim and Charles Bettan, Endpoint Security Researchers, March 19th 2019 Sand Blast Agent Forensics team have noticed a new variant of the Monero mining malware spreading throughout organizations worldwide. Interestingly, this malware showed similarities with the infection and propagation techniques of popular trojan and ransomware attacks and made use of legitimate IT admin…

The post Check Point Forensic Files: A New Monero CryptoMiner Campaign appeared first on Check Point Software Blog.

AlienVault.png 2019-03-19 13:00:00 The NIST cybersecurity framework (CSF) and what it can do for you (lien direct)

The NIST Cybersecurity Framework (CSF) has only been around for four years and while developed for critical infrastructure, resulting from Executive Order 13636, it has been widely adopted across both private and public sectors and organizational sizes.  It is used inside of the US government, with 20 states using it (at last count). In addition, international organizations such as the Italian government, as well as private sector organizations including technology and education are using the framework.  

Why is this? 

If there’s one overarching theme of the NIST CSF when it comes to implementation, it’s that there’s no one-size-fits-all solution.  Your risk profile, regulatory requirements, and financial and time constraints are unique, and the NIST CSF allows each organization to take these factors into account when implementing the CSF.  Moreover, implementation is not an all-or-nothing proposition. Without the restrictions of a formal compliance regulation to hold you back, you are free to implement the NIST framework in whatever way best fits your business needs.  Once you establish your unique, current profile and target profile, you can use the gaps between them as a tool to help prioritize improvement actions, based upon your budget and resources.  

The NIST CSF allows you to establish or build upon your foundation by identifying what needs to be protected, implementing safeguards, and detecting, responding to, and recovering from events and incidents.  In the simplest terms, NIST CSF defines outcomes based upon your unique threats and risks, as well as how you manage risks within your organization:

Know what you have and what you are facing

The NIST CSF calls on organizations to identify your data and the devices that store, transmit, and process information.  This means you must have an inventory of data, the devices, the applications, and the underlying infrastructure that process and store that data.  

Now that you know what data you have, you can identify threats and vulnerabilities in the environment.   This allows you to focus on protecting the ‘riskiest’ assets or what is most valuable to your organization. 

Put protection measures in place

Once you know what you need to protect, put measures in place to safeguard that data.  Taking the approach of "We have a firewall. Our data is protected" is long gone.  A layered approach to security is imperative protecting the connectivity layer, the application layer, and the device itself. 

Monitor, monitor, monitor

There are always changing circumstances, even with the most mature security programs.  That is why you must continually monitor the environment to detect events and potential incidents.  Not only must you monitor but you must improve your monitoring strategy and technologies that you use.  Detection must be efficient and effective - your organization can fall into one of these two buckets:  you have been breached and you know it or you have been breached and you don’t know it.  Continually optimize and tune the technologies and processes you have in place.  You cannot respond to what you can’t detect

Have a plan

Like we all know, it’s not if you get breached, it’s when.  Having a formal, tested response plan that is known by the organization, its stakeholders, and responders is crucial.&nbsp

WiredThreatLevel.png 2019-03-19 13:00:00 Ooni Koda Pizza Oven Review: A Backyard Pie Party (lien direct)

Can a home pizza oven be easy and convenient? With this backyard Ooni oven, it can.

WiredThreatLevel.png 2019-03-19 13:00:00 Sikorsky\'s Self-Flying Helicopter Hints at the Flying Future (lien direct)

The Lockheed Martin subsidiary has made giving flight a whirl a matter of tapping on a tablet.

WiredThreatLevel.png 2019-03-19 12:30:00 Apple iMac 2019: Specs, Price, Release Date (lien direct)

Apple just refreshed its desktop computers. One of them now runs on Intel\'s 9th-generation processor.

SecurityWeek.png 2019-03-19 12:22:04 Norway\'s Norsk Hydro Hit by \'Extensive\' Cyberattack (lien direct)

One of the world\'s biggest aluminium producers, Norway\'s Norsk Hydro, said Tuesday it had been hit by a cyber-attack of unknown origin.

"Hydro became victim of an extensive cyberattack in the early hours of Tuesday, impacting operations in several of the company\'s business areas," the energy group said in a statement.

read more

ZDNet.png 2019-03-19 12:14:00 Aluminum producer switches to manual operations after ransomware infection (lien direct)

UPDATE: Cyber-attack identified as LockerGoga ransomware infection.

ZDNet.png 2019-03-19 12:14:00 EU government websites infested with third-party adtech scripts (lien direct)

Ironic as it may be, EU websites might not be compliant with the EU\'s own data protection rules.

Blog.png 2019-03-19 12:00:05 NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs (lien direct)

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper Exabeam is a bold upstart in the SIEM space. The path this San Mateo, CA-based vendor is […]

securityintelligence.png 2019-03-19 12:00:02 Why You Should Integrate IoT Security Into Your Vulnerability Management Program (lien direct)

>Many IT professionals and executives alike are not addressing IoT security at the same level at which it\'s creating tangible business risks.

The post Why You Should Integrate IoT Security Into Your Vulnerability Management Program appeared first on Security Intelligence.

Kaspersky.png 2019-03-19 12:00:00 ThreatList: DDoS Attack Sizes Drop 85 Percent Post FBI Crackdown (lien direct)

The FBI\'s crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.

WiredThreatLevel.png 2019-03-19 12:00:00 Instagram\'s New Shopping Feature Works Like a Digital Mall (lien direct)

Because #capitalism.

BBC.png 2019-03-19 11:32:03 Facebook: New Zealand attack video viewed 4,000 times (lien direct)

Facebook says 4,000 people viewed the original attack video and fewer than 200 watched it live.

ESET.png 2019-03-19 11:25:01 I didn\'t see what you did, redux (lien direct)

Cyberblackmail/sextortion again raises its not-so-pretty little head

The post I didn’t see what you did, redux appeared first on WeLiveSecurity

The_Hackers_News.png 2019-03-19 11:19:02 Android Q - Google Adds New Mobile Security and Privacy Features (lien direct)

Google has recently released the first beta version of Android Q, the next upcoming version of Google\'s popular mobile operating system, with a lot of new privacy improvements and other security enhancements. Android Q, where Q has not yet been named, offers more control over installed apps, their access, and permissions, and location settings; more support for passive authentication like face

Korben.png 2019-03-19 11:00:01 Hyper – Un terminal entièrement customisable selon vos envies et besoins (lien direct)

Je sais qu’Electron est énormément taunté par certains puristes, mais bon, j’ai envie de dire OSEF. Mon avis c’est que peu importe la techno, du moment que les projets avancent, que des choses se créent et qu’un maximum de personnes peut en profiter. On peut toujours se pignoler sur les … Suite

WiredThreatLevel.png 2019-03-19 11:00:00 The Read/Write Metaphor Is a Flawed Way to Talk About DNA (lien direct)

Among both scientists and laypeople, DNA is a language, one which we “read,” “write,” and “edit.” The metaphor may distort our understanding of genetics.

SecurityWeek.png 2019-03-19 10:40:03 From Traffic Cop to Fleet Manager, DLP Evolves Beyond the Perimeter (lien direct)

Perimeter-based DLP Enforcement Has Increasingly Taken a Backseat to Host-based Implementations

read more

BBC.png 2019-03-19 10:22:01 Huge aluminium plants hit by \'severe\' ransomware attack (lien direct)

The Norwegian firm, which employs 35,000 people worldwide, has switched to manual controls at some plants.

Blog.png 2019-03-19 10:12:01 Command & Control Tool: Pupy (lien direct)

In this article, we will learn to exploit Windows, Linux and Android with pupy command and control tool. Table of Content : Introduction Installation Windows Exploitation Windows Post Exploitation Linux Exploitation Linux Post Exploitation Android Exploitation Android Post Exploitation Introduction Pupy is a cross-platform, post exploitation tool as well as a multi-function RAT. It\'s written... Continue reading

The post Command & Control Tool: Pupy appeared first on Hacking Articles.

CSO.png 2019-03-19 10:09:00 Does GDPR compliance reduce breach risk? (lien direct)

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides a benefit. A report by EY and the International Association of Privacy Professionals (IAPP) estimates that organizations have spend an average of $3 million to achieve compliance with the European Union\'s General Data Protection Regulation (GDPR), a sweeping piece of legislation that affects any company that stores or processes data on European Union (EU) citizens.

To read this article in full, please click here

The_Hackers_News.png 2019-03-19 10:05:01 Ransomware Attack Forces Aluminum Manufacturer to Shutdown Systems Worldwide (lien direct)

Photo by Terje Pedersen / NTB scanpix One of the world\'s largest producers of aluminum has been forced to shut down several of its plants across Europe and the U.S. after an "extensive cyber attack" hit its operations, leaving companies\' IT systems unusable. According to a press release shared by Aluminum giant Norsk Hydro today, the company has temporarily shut down several plants and

WiredThreatLevel.png 2019-03-19 10:00:00 Preparing to Unleash Crispr on an Unprepared World (lien direct)

Researchers are poised to bring gene-editing tech out of the lab. But just how far do we want Crispr to go?

WiredThreatLevel.png 2019-03-19 10:00:00 Beyond Cas9: 4 Ways to Edit DNA (lien direct)

As Crispr wends its way out of the petri dish and into our genes, scientists are searching for even sharper tools.

WiredThreatLevel.png 2019-03-19 10:00:00 A More Humane Livestock Industry, Brought to You by Crispr (lien direct)

Horn-free? Yup. Heat-tolerant? Sure. Flu-proof? Of course. Gene editing aims to make our food supply kinder and more efficient. But it\'s struggling to leave the barn.

WiredThreatLevel.png 2019-03-19 10:00:00 Coders\' Primal Urge to Kill Inefficiency-Everywhere (lien direct)

For software engineers, lack of friction is an aesthetic joy, an emotional high, the ideal existential state. It\'s what drives them-and shapes our world.

WiredThreatLevel.png 2019-03-19 10:00:00 Better Living Through Crispr: Growing Human Organs in Pigs (lien direct)

Scientist Juan Carlos Izpisua Belmonte wants to use gene editing to create human-animal hybrids that we can harvest for parts. What could go wrong?

ZDNet.png 2019-03-19 09:44:05 Facebook blocked over 1.2 million New Zealand shooting videos at upload (lien direct)

Facebook has released new figures relating to the live-streamed attacks.

SecurityAffairs.png 2019-03-19 09:30:00 EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks (lien direct)

Europol announced the EU Law Enforcement Emergency Response Protocol new protocol for law enforcement agencies in the European Union and abroad to handle major cross-border cyberattacks. Europol announced the adoption of a new protocol for law enforcement bodies in the EU and abroad to respond to major cyber cross-border cyberattacks. The protocol dubbed EU Law […]

The post EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks appeared first on Security Affairs.

Korben.png 2019-03-19 09:00:02 Quels sont les outils utilisés par les développeurs professionnels ? (lien direct)

Si vous êtes développeur, vous avez sans doute vos petites habitudes, vos outils et autres IDE préférés, sans parler de la config aux petits oignons de chacun d’eux. Et c’est cool. Souvent les techos aiment bien partager leur set-up ou la liste de leur matos avec d’autres. Ça inspire, ça … Suite

WiredThreatLevel.png 2019-03-19 09:00:00 The Evidence That Could Impeach Donald Trump (lien direct)

Nancy Pelosi\'s comments about impeachment acknowledge a political reality: Nothing the Mueller probe has revealed so far has moved the GOP substantially.

DarkReading.png 2019-03-19 08:30:00 New Mirai Version Targets Business IoT Devices (lien direct)

The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.

Blog.png 2019-03-19 07:05:04 BEST PRACTICES: 6 physical security measures every company needs (lien direct)

It has never been more important to invest in proper security for your business. Laws surrounding the personal data of individuals such as the General Data Protection Regulation (GDPR) put the onus on companies to ensure that both digital and physical copies of data are secure at all times. Related: Shrinking to human attack vector […]

SecurityAffairs.png 2019-03-19 06:54:03 A new development shows a potential shift to using Mirai to target enterprises (lien direct)

PaloAlto Networks researchers discovered a new variant of the infamous Mirai botnet is targeting IoT devices belonging to businesses. Researchers at PaloAlto Networks spotted a new variant of the infamous Mirai botnet is targeting IoT devices belonging to businesses. Mirai malware first appeared in the wild in 2016 when the expert MalwareMustDie discovered it in massive attacks […]

The post A new development shows a potential shift to using Mirai to target enterprises appeared first on Security Affairs.

The_Hackers_News.png 2019-03-19 03:27:02 Libssh Releases Update to Patch 9 New Security Vulnerabilities (lien direct)

Libssh2, a popular open source client-side C library implementing the SSHv2 protocol, has released the latest version of its software to patch a total of nine security vulnerabilities. The Libssh2 library is available for all major distributors of the Linux operating systems, including Ubuntu, Red Hat, Debian, and also comes bundled within some distributions and software as a default library

ZDNet.png 2019-03-19 01:16:03 Google open-sources project for sandboxing C/C++ libraries on Linux (lien direct)

Support for other programming languages to be added in future releases.

The_Hackers_News.png 2019-03-19 00:55:05 Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices (lien direct)

Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for use within business environments in an attempt to gain control over larger bandwidth to carry out devastating DDoS attacks. Although the original creators of Mirai botnet have already been arrested and jailed, variants of the infamous IoT malware

ZDNet.png 2019-03-18 23:01:00 Hacked tornado sirens taken offline in two Texas cities ahead of major storm (lien direct)

City officials took hacked tornado sirens offline ahead of major storm. Luckily, they weren\'t needed.

Blog.png 2019-03-18 20:43:05 RSA Recap: CTO Zulfikar Ramzan talks about Trust, Zero Trust and the Debate over Going Dark (lien direct)

I talk with Zulfikar Ramzan, Chief Technology Officer (CTO) at RSA Security* about the major trends at this year\'s RSA Conference including the growing focus on digital risk and trust, the debate around encryption, law enforcement and "going dark" and what people mean when they talk about "zero trust" networks.

The post RSA Recap: CTO Zulfikar...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599762676/0/thesecurityledger -->»

ArsTechnica.png 2019-03-18 18:36:05 Google, Microsoft work together for a year to figure out new type of Windows flaw (lien direct)

Researcher finds building blocks for privilege escalation: Can they be assembled to create a flaw?

ZDNet.png 2019-03-18 17:22:03 New Mirai malware variant targets signage TVs and presentation systems (lien direct)

Security researchers spot new Mirai botnet with an enhanced arsenal of IoT exploits.

Korben.png 2019-03-18 17:00:03 Astuces pour mémoriser les codes hexa des couleurs à utiliser dans vos projets web (lien direct)

Je suis tombé là-dessus par hasard et j’ai trouvé ça pratique donc je vous le partage ici. Il n’est pas simple lorsqu’on code et qu’on n’est pas designer, de choisir correctement les couleurs à donner à son projet. Heureusement, il existe des sites comme Color Hunt qui recensent pas mal … Suite

SecureMac.png 2019-03-18 17:00:02 Checklist 129: The Internet of Things and Other Things (lien direct)

On this week\'s Checklist by SecureMac: Congress nibbles at the Internet of Things, Out of sight is not off the grid and A show worthy of a security conference.

The post Checklist 129: The Internet of Things and Other Things appeared first on SecureMac.

Blog.png 2019-03-18 16:57:05 Multiple Ways to Exploiting OSX using PowerShell Empire (lien direct)

In this article, we will learn multiple ways to how to hack OS X using empire. There are various stagers given in empire for the same and we use a few of them in our article. Method to attack OS X is similar to that of windows. For the beginner\'s guide to pen-test OS X... Continue reading

The post Multiple Ways to Exploiting OSX using PowerShell Empire appeared first on Hacking Articles.

SecureMac.png 2019-03-18 16:17:02 iPhone Prototypes Find Their Way to Hackers and Researchers Alike (lien direct)

Have you ever wondered about how hackers or security researchers can figure out where the hidden flaws in iOS lay? For years, that’s been a big question, from concerns about how companies such as Cellebrite and GrayKey found their way into iOS to how researchers were able to examine how the Secure Enclave works. Thanks to a report by Motherboard picked up by Cult of Mac; we now have a ...

The post iPhone Prototypes Find Their Way to Hackers and Researchers Alike appeared first on SecureMac.

no_ico.png 2019-03-18 16:09:05 India\'s Intermediary Guidelines (lien direct)

I’ve signed on to Access Now’s letter to the Indian Ministry of Electronics and Information Technology, asking the Government of India to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules. As they say in their press release: Today\'s letter, signed by an international coalition of 31 organizations and individuals, explains how…

Continue reading

grahamcluley.png 2019-03-18 16:09:00 Google Play is flooded with hundreds of unsafe Android anti-virus products (lien direct)
Google Play is flooded with hundreds of unsafe anti-virus products

A new study has closely examined whether 250 security products for Android smartphones are capable of protecting users at all.

The results are in… and disturbing.

Read more in my article on the Hot for Security blog.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter