What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfoSecurityMag.webp 2022-12-09 10:30:00 Government to Fund Security Studies for Hundreds of Students (lien direct) Latest move shows urgent need to nurture skills pipeline Studies ★★★
Chercheur.webp 2022-12-07 12:04:41 The Decoupling Principle (lien direct) This is a really interesting paper that discusses what the authors call the Decoupling Principle: The idea is simple, yet previously not clearly articulated: to ensure privacy, information should be divided architecturally and institutionally such that each entity has only the information they need to perform their relevant function. Architectural decoupling entails splitting functionality for different fundamental actions in a system, such as decoupling authentication (proving who is allowed to use the network) from connectivity (establishing session state for communicating). Institutional decoupling entails splitting what information remains between non-colluding entities, such as distinct companies or network operators, or between a user and network peers. This decoupling makes service providers individually breach-proof, as they each have little or no sensitive data that can be lost to hackers. Put simply, the Decoupling Principle suggests always separating who you are from what you do... Studies ★★★
InfoSecurityMag.webp 2022-12-05 15:00:00 Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments (lien direct) 42% of UK manufacturers have been a victim of cybercrime in the past 12 months, according to new research Studies ★★★
globalsecuritymag.webp 2022-12-05 08:29:29 Les prévisions mondiales de Mandiant en matière de cybersécurité en 2023 (lien direct) Les prévisions mondiales de Mandiant en matière de cybersécurité en 2023 Mandiant présente son rapport Mandiant Cyber Security Forecast 2023 et ses prédictions pour l'année à venir dans le monde. - Magic Quadrant Studies ★★
globalsecuritymag.webp 2022-11-30 09:06:10 Smishing : Les quatre arnaques les plus tendances en 2022 (lien direct) Smishing : Les quatre arnaques les plus tendances en 2022 Cette année, ce ne sont pas moins de 3,5 milliards de sms frauduleux par jour qui ont été reçus dans le monde. Mais ce qui est plus effrayant est de constater que moins de 35 % des personnes qui les reçoivent ne savent pas qu'ils sont victimes d'une tentative d'hameçonnage. L'étude menée par Terranova Security avec IPSOS du mois d'octobre 2022 révélait d'ailleurs que seuls 8 % des Français citaient les sms comme une source d'arnaques… Un chiffre bien loin de la réalité actuelle ! - Investigations Studies ★★★
globalsecuritymag.webp 2022-11-30 09:03:00 Services financiers : une étude Akamai montre que les cyberattaques des applications Web et des API ont augmenté de 257 % par rapport à l\'année précédente (lien direct) Services financiers : une étude Akamai montre que les cyberattaques des applications Web et des API ont augmenté de 257 % par rapport à l'année précédente Le rapport État des lieux de l'Internet montre que 80 % des pirates prennent pour cible les clients des services financiers plutôt que les institutions - Investigations Studies ★★★
Sontiq.webp 2022-11-29 20:25:20 15-Min Webinar | Surveying 2023\'s Cyber Landscape | Preparing for Next Year\'s Risks Now (lien direct) > Join Us! Wednesday, December 14 at 2 p.m. ET | 11 a.m. PT Ready for 2023? A new year and a new crop of cyber threats are just around the corner. Cybercriminals may roll out new scams and schemes designed to access your valuable information, but there's no need to head into the new year […] Studies ★★
CSO.webp 2022-11-28 02:00:00 Top 7 CIAM tools (lien direct) Customer identity and access management (CIAM), a subset of identity access management (IAM), is used to manage authentication and authorization of account creation and login process for public facing applications. To helps organizations compare their needs against the options in the market, CSO prepared a list with the top seven vendors in the market.To decide for the right CIAM product, organizations must balance the ease of the login experience with a kaleidoscope of business goals for how customers sign-in and leverage their accounts. Marketers want to collect data about customers and their devices. Privacy officers want to ensure the data collection process is fully compliant with privacy regulations. And security and risk professionals want to ensure the integrity of accounts and minimize fraudulent usages of customer credentials.To read this article in full, please click here Studies ★★★
knowbe4.webp 2022-11-25 20:39:41 Cybersecurity incidents cost organizations $1,197 per employee, per year (lien direct) Cybersecurity incidents cost organizations $1,197 per employee, per year Studies ★★★★★
Troy_Hunt.webp 2022-11-23 19:38:29 Get Pwned, for 30% Less! (lien direct) We've had great feedback from people who have gotten Pwned. Loads of people had told us how much they've enjoyed it and would like to get their friends Pwned too. Personally, I think everyone should get Pwned! Which is why we're making it possible Studies ★★★
SecureList.webp 2022-11-22 08:00:51 ICS cyberthreats in 2023 – what to expect (lien direct) The coming year looks to be much more complicated. In the post we share some of our thoughts on potential developments of 2023, though we cannot claim to be providing either a complete picture or a high degree of precision. Studies ★★★★
SecureList.webp 2022-11-22 08:00:12 Crimeware and financial cyberthreats in 2023 (lien direct) This report assesses how accurately we predicted the developments in the financial threats landscape in 2022 and ponder at what to expect in 2023. Studies ★★★
globalsecuritymag.webp 2022-11-22 07:52:41 Étude Rubrik Zero Labs : 92 % des entreprises craignent de ne pas pouvoir assurer la continuité des activités en cas de cyberattaque (lien direct) La première étude du nouveau laboratoire de recherche en cybersécurité de Rubrik fait un état complet des risques de sécurité rencontrés par les organisations. Rubrik, le spécialiste de la sécurité des données Zéro Trust annonce la publication de son étude intitulée "L'état de la sécurité des données" réalisée par son nouveau laboratoire de recherche en cybersécurité Rubrik Zero Labs. Pour effectuer cette étude, le nouveau laboratoire de recherche en cybersécurité de Rubrik, Rubrik Zero Labs a recueilli les (...) - Investigations Studies ★★
01net.webp 2022-11-22 06:22:40 Catastrophique : voici les mots de passe les plus utilisés en France (lien direct) cadenas securite mot de passeDeux nouveaux rapports dévoilent les mots de passe les plus utilisés en 2022. Ces données venant du dark web révèlent, encore une fois, les terribles choix faits par une majorité d'utilisateurs, au détriment de leur sécurité. Studies ★★★★
Mandiant.webp 2022-11-09 15:00:00 Menace d'initié: études d'impact
Insider Threat: Impact Studies
(lien direct)
Notre précédent article de menace d'initiés a partagé des détails sur Types de menaces d'initiés et pourquoi ils sont une préoccupation .Dans cet article, nous partageons quelques exemples et stratégies d'atténuation. Exemples d'incidents de menace d'initiés significatifs Avec une technologie en évolution rapide, la menace d'un initié et le coût associé pour contenir et répondre à un incident se développe.Il y a eu des incidents importants où les organisations ont non seulement souffert de lésions de la marque ou de perte de données critiques, mais ont également fini par subir de grandes pertes financières.Certains des cas publics notables sont: le supérieur
Our previous insider threat post shared details on
types of insider threats and why they are a concern. In this post we share some examples and mitigation strategies. Examples of Significant Insider Threat Incidents  With rapidly evolving technology, the threat of an insider and the associated cost for containing and responding to an incident is growing. There have been some significant incidents where organizations not just suffered from brand damage, or loss of critical data, but also ended up bearing large financial losses. Some of the notable public cases are:  The superior
Threat Studies ★★★
AlienVault.webp 2022-11-01 10:00:00 Choosing a DAST solution: What to pay attention to? (lien direct) The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The majority of today's web applications contain dangerous vulnerabilities. To analyze their security, one cannot do without a dynamic scanner. DAST (Dynamic Application Security Testing) tools allow you to detect and evaluate security problems quickly. Let me tell you what to look for when choosing such a tool. According to various studies, 70% of vulnerabilities have to do with errors in the code. Using vulnerabilities in your web application code, hackers can distribute malware, launch cryptojacking attacks, employ phishing and redirect users to malicious sites, hack a phone remotely, or steal personal data using social engineering techniques.  Yes, sure, it is impossible to create perfectly secure software, but it is quite possible to reduce the number of vulnerabilities and increase the level of product security. To do this, you can rely on DevSecOps - a process that links development and security and where software is checked and tested for vulnerabilities at every stage of its creation. The DevSecOps process is very voluminous; it may include numerous information security tools. In this article, I want to talk about DAST and how to choose the right scanner for dynamic application analysis. Together we will figure out what tool characteristics and parameters you need to pay attention to and what product types are currently available on the market. What is DAST, and how does it work? Dynamic application security testing is one of the secure development practices where an automated analysis of a deployed and functioning application is carried out. The dynamic scanner checks all access points via HTTP, simulates external attacks using common vulnerabilities, and simulates various user actions. The tool determines which APIs the service has, sends verification requests, uses, where possible, incorrect data (quotes, delimiters, special characters, and more). The dynamic scanner sends and analyzes a large number of requests. The analysis of the sent request and the received response, as well as their comparison with a regular request, allows you to find different security problems. Most scanners have similar functions and modus operandi. Their main components are a crawler and an analyzer. The crawler traverses every link on every page it can reach, examining the contents of files, pressing buttons, and going through a dictionary of possible page names. This process allows you to estimate the size of the attack surface and possible attack vectors taking into account the existing ways of interacting with the application. The analyzer checks the application directly. It can work in passive or active mode. In the first case, the analyzer studies only information that the crawler sends to it. In the second, the analyzer sends requests with incorrect data to the points found by the crawler and to other places that are not currently present on the pages but can be used in the application. It then infers the presence of a vulnerability based on the server's responses. What should you pay attention to when choosing a DAST tool? Scan quality This Tool Vulnerability Studies Guideline
AlienVault.webp 2022-10-04 10:00:00 8 Cybersecurity trends to be aware of in 2022/2023 (lien direct) This blog was written by an independent guest blogger. The last couple of months were devastating for cybersecurity. Cyber threats intensify each waking day, and criminals seem to be getting more sophisticated and better at beating the system.  For instance, the first six months of 2022 saw a whopping 40% increase in cyber-attacks from the previous year, with Ransomware being declared a state-level weapon. These attacks are causing severe disruptions to everyday lives, affecting essential services such as medical care, schools, etc. For instance, an attack on Lincoln College in the US resulted in the college closing its doors after 157 years. Needless to say, cybersecurity threats and attacks aren’t slowing down or going away anytime soon. As the risk of cybersecurity attacks continues to grow, so have the trends predicted for cybersecurity in the next year.  Here are some of the most critical cybersecurity trends you need to keep an eye on. User awareness Surprisingly, about 97% of people with access to the internet still cannot identify when an email is a phishing email. This is why many people will readily click on a phishing email, and thus become victims to cyberattacks.  This shows that there is a huge need for awareness, and education is crucial to identify and prevent costly identity theft and network hacks. Thankfully, many businesses today go beyond implementing strong firewalls and sophisticated IT protocols by augmenting their IT personnel's capabilities through training to equip them with the skills needed to fight cyber-attacks. Some institutions use classroom and web-based to promote and train cybersecurity awareness. Companies are also focusing more on how workers share and handle confidential data. For instance, many organizations are now putting a lot of effort into educating their employees on how to protect themselves from identity theft. After all, research shows that about 80 percent of data breaches can be avoided by practicing and implementing simple cyber hygiene.  Geo-targeted phishing threats Phishing is still the most severe security threat on the internet to date — and a majority of the population is at a high risk of falling prey to this threat. Phishing emails and dangerous URLs are still common on the internet, but they are now customized, tailored, and geo-targeted. Cybercriminals are taking the time to research and devise ways to craft polished business email compromise attacks that can fool even the best eye.  Therefore, businesses, and individuals alike, should invest time and effort into comprehensive security awareness programs to protect their data and ensure website safety.  GDPR compliance The general data protection regulation is the decade’s most notable developments in IT across the European Union. The law is the brainchild of the EU, but it’s already having major impacts on data protection requirements across the globe.  The law imposes standard data security law on all EU countries and requires all organizations selling to EU residents to comply with its regulations regardless of their location. As such, GDPR provides uniform data protection to all consumers in the EU regions.  Since the GDPR is st Ransomware Threat Studies Guideline
no_ico.webp 2022-09-30 14:03:14 Identities Stolen From 1 In 4 Internet Users (lien direct) Today, the National Cyber Security Alliance (NCSA) and CybSafe launch the annual 'Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors report', which studies 3,000 individuals across the U.S., the UK and Canada towards cybersecurity.   Some of the key findings reveal:  Nearly half (45%) are connected to the internet all the time  Increased connectivity has resulted in almost a quarter (24%) […] Studies
AlienVault.webp 2022-08-09 10:00:00 Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks? (lien direct) As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment. But as they seek to reap tremendous business gains from smart devices in industrial IoT, they also must balance that upside with the potential risks that IoT is increasingly introducing to manufacturing environments. New cyber challenges are arising in the face of this explosion of IoT in manufacturing. They require organizations in this sector to design modern security architecture that can meet them head on. Smart manufacturing and the rise in IoT Consensus across recent industry studies shows that manufacturers are making big bets on smart manufacturing and IoT as the lynchpins to their success in the coming years. According to Deloitte’s 2022 Manufacturing Industry Outlook, some 45% of manufacturing executives expect increases in operational efficiency from investments in IoT that connects machines and automates processes. Meantime, the State of Smart Manufacturing report published in 2022 by Plex found that 83% of manufacturers say that smart manufacturing is a key to their organization’s future success. Smart devices and IIoT are among the most used projects to bring smart manufacturing to fruition. Some 49% of organizations have already deployed smart devices and 45% have put IIoT into production, with another 35% and 36%, respectively, planning to use these technologies. This is rapidly pushing a lot of manufacturing compute out to the edge. AT&T’s own recent analysis for the AT&T Cybersecurity Insights Report: Securing the Edge-A Focus on Manufacturing study found that the manufacturing vertical is one of the furthest along in implementing edge use cases. The report reveals that 78% of manufacturers globally are planning, have partially, or have fully implemented an edge use case - that’s ahead of energy, finance, and healthcare industry organizations.     This kind of progress noted by the report is in sync with other industry studies watching the progress of digital transformation in manufacturing. For example, a study by Palo Alto Networks says the demand for secure remote access in manufacturing is rapidly outstripping other industries. Amid many cited edge use cases such as smart warehousing, remote operations, and augmented maintenance, video-based inspection was the number one edge priority cited by manufacturing respondents to the AT&T Cybersecurity Insights Report . This is a prime example of how IoT is being leveraged to improve efficiency, quality and speed on factory floor, while helping manufacturers also overcome workforce challenges. Unpatchable IoT devices raises manufacturing risk profile Video-based inspection also provides an excellent example of how IoT devices can at the same time potentially increase cyber risk in manufacturing environments. In use cases like this one, IoT devices such as cameras are increasingly connected to OT networks and devices on the manufacturing shop floor. Simultaneously, they’re also opening up access outside th Threat Studies Patching Guideline Deloitte
GoogleSec.webp 2022-07-19 12:59:33 DNS-over-HTTP/3 in Android (lien direct) Posted by Matthew Mauer and Mike Yu, Android team To help keep Android users' DNS queries private, Android supports encrypted DNS. In addition to existing support for DNS-over-TLS, Android now supports DNS-over-HTTP/3 which has a number of improvements over DNS-over-TLS. Most network connections begin with a DNS lookup. While transport security may be applied to the connection itself, that DNS lookup has traditionally not been private by default: the base DNS protocol is raw UDP with no encryption. While the internet has migrated to TLS over time, DNS has a bootstrapping problem. Certificate verification relies on the domain of the other party, which requires either DNS itself, or moves the problem to DHCP (which may be maliciously controlled). This issue is mitigated by central resolvers like Google, Cloudflare, OpenDNS and Quad9, which allow devices to configure a single DNS resolver locally for every network, overriding what is offered through DHCP. In Android 9.0, we announced the Private DNS feature, which uses DNS-over-TLS (DoT) to protect DNS queries when enabled and supported by the server. Unfortunately, DoT incurs overhead for every DNS request. An alternative encrypted DNS protocol, DNS-over-HTTPS (DoH), is rapidly gaining traction within the industry as DoH has already been deployed by most public DNS operators, including the Cloudflare Resolver and Google Public DNS. While using HTTPS alone will not reduce the overhead significantly, HTTP/3 uses QUIC, a transport that efficiently multiplexes multiple streams over UDP using a single TLS session with session resumption. All of these features are crucial to efficient operation on mobile devices. DNS-over-HTTP/3 (DoH3) support was released as part of a Google Play system update, so by the time you're reading this, Android devices from Android 11 onwards1 will use DoH3 instead of DoT for well-known2 DNS servers which support it. Which DNS service you are using is unaffected by this change; only the transport will be upgraded. In the future, we aim to support DDR which will allow us to dynamically select the correct configuration for any server. This feature should decrease the performance impact of encrypted DNS. Performance DNS-over-HTTP/3 avoids several problems that can occur with DNS-over-TLS operation: As DoT operates on a single stream of requests and responses, many server implementations suffer from head-of-line blocking3. This means that if the request at the front of the line takes a while to resolve (possibly because a recursive resolution is necessary), responses for subsequent requests that would have otherwise been resolved quickly are blocked waiting on that first request. DoH3 by comparison runs each request over a separate logical stream, which means Studies
CSO.webp 2022-07-11 02:00:00 Understanding your API attack surface: How to get started (lien direct) We live in a world of cloud computing, mobile devices and microservices. Nearly every application we interact with is powered by APIs, often many, especially when dealing with the leading cloud service providers (CSPs), mobile applications and microservice environments. This makes APIs a critical part of an organization's attack surface.Akamai estimates that roughly 83% of internet traffic is API-based. Other studies such as those from Salt Security state that API attacks increased over 600% from 2021 to 2022, and Gartner predicts that 90% of web-enabled applications will have broader attack surfaces due to exposed API's. The latest study from Imperva claims that vulnerable APIs are costing organizations between $40 and $70 billion annually.To read this article in full, please click here Studies Guideline
Anomali.webp 2022-06-30 10:00:00 Dealing with the Cybersecurity Challenges of Digital Transformation (lien direct) We’re back after a little hiatus with this week’s blog in the series in which I explore the “Top 10 List of the Challenges Cybersecurity Professionals Face,” as found in our Cybersecurity Insights Report 2022: The State of Cyber Resilience. Coming in at number two on our list: Dealing with the speed and complexity of digital transformation. During the COVID-19 crisis, digital transformation became even more critical. To describe digital transformation in economic terms means integrating digital technologies into every aspect of a business, resulting in fundamental changes to how companies operate and provide value to their customers. Technology has changed from supporting business processes to becoming integral to a company’s customer value proposition. A study by McKinsey found that companies accelerated their digital transformation efforts by three to seven years within just months, fearing that they would lose their competitive advantage and be left behind by competitors already ahead. Organizations need to rethink what they mean when saying “digital transformation.” It’s not just about making your website responsive, adding digital capabilities, or creating a mobile app for your business. It’s about changing your mindset when thinking about your customers, empowering your staff, and powering business. And ensuring your security program can adapt to that mindset to ensure the security of your enterprise. Digital Transformation Increases Cyber Risk   Security teams continue to face unique challenges daily. Their organization’s digital transformation initiatives continue to increase the complexity, expanding their attack surface with a distributed infrastructure. Because of this, cybersecurity postures should be updated and adjusted to support transformation goals to defend against this new level of complexity. In addition to the ever-changing threat landscape, security teams face more concerns due to a more distributed workforce. They also need to evaluate the risks associated with a growing number of connected devices and the disappearing perimeter. The increased adoption of cloud infrastructures also poses unique challenges to organizations, forcing them to transform their security posture to protect against cloud infrastructure vulnerabilities. Securing a Remote Work Force Remote work is here to stay and will only increase. Global Workplace Analytics calculates that 22% of the workforce (i.e., 36.2 million Americans) will work remotely by 2025. The significant uptick in remote work setups and digital business is pushing organizations to apply for secure access no matter where their users, applications, or devices are located. To provide the level of security necessary to protect the variety of new systems implemented, many enterprises are shifting to more cloud-friendly and behavior-based security approaches.  New Challenges and Security Vulnerabilities As mentioned above, studies show that a large portion of those working from home will likely stay that way for the long term. Corporate leaders attempting to coax employees back to the office have broadly accepted the inevitability of the hybrid work model. To ensure their defensive measures remain in place and to maintain business as usual safely, it’s critical for IT teams to develop strategic plans to safeguard employees, facilities, data, Tool Threat Studies Guideline
CSO.webp 2022-06-23 13:48:00 Open-source software risks persist, according to new reports (lien direct) Open-source software (OSS) has become a mainstay of most applications, but it has also created security challenges for developers and security teams, challenges that may be overcome by the growing "shift left" movement, according to two studies released this week.More than four out of five organizations (41%) don't have high confidence in their open-source security, researchers at Snyk, a developer security company, and The Linux Foundation reveal in their The State of Open Source Security report.It also notes that the time to fix vulnerabilities in open-source projects has steadily increased over the last three years, more than doubling from 49 days in 2018 to 110 days in 2021.To read this article in full, please click here Studies
TroyHunt.webp 2022-06-03 20:26:26 NY passes US-first moratorium on reviving fossil fuel plants to mine crypto (lien direct) If signed by gov., bill would halt permits while state studies environmental impact. Studies
Responsible_Cyber.webp 2022-05-27 02:52:14 Hybrid Work & Happiness (lien direct) Written by Shareen Song; UI/UX, and Quality Manager at Responsible Cyber Pte. Ltd.It is estimated that about 50% of the world's workforce will continue to work remotely, or more likely, within a hybrid work arrangement; the 50% who will need to show up in person are frontliners in retail, healthcare, manufacturing, and services. (https://www.barrons.com/articles/ive-been-studying-work-from-home-for-years-heres-whats-coming-51641330825)For those of us reading this in the midst of a workday, clad in a crisp ironed top and bottomed in comfy shorts, a chubby pet on the lap, and a glass of home-brewed kombucha in hand, the one blessing that covid has conferred is the opportunity to work from home. A slew of surveys and research from the likes of Cisco, Harvard, Microsoft, Gartner etc. cannot be wrong - hybrid work is here to stay, and hybrid workers are reportedly more productive and happier.As a Gen Xer who started work in the 1990s, the pandemic offered me my first taste of remote working… and I have to say that Cisco et al are absolutely right…I AM happier! (And I'd also like to believe my productivity hasn't suffered either!)Watch Magda Chelly's Secure Hybrid Work day: — @ciscoapacPrior to the covid lockdown, a regular office day meant spending more than 10 hours away from home and not having the will for much else when I got back; meals were mostly take out or eat out and each week merged into the next with very little time or energy to spare. Like most everyone else, the weekends were to catch up with family, friends, and sleep.Remote working immediately eliminated the much dreaded daily rush hour commute on packed public transportation AND handed over the gift of two 'free' hours for each day that I didn't have to prep for and travel to and from work. I quickly realised the potential of this now available time; with just a little planning, I can effectively use this resource to achieve inner zen, happiness, self-actualisation… whatever you want to label that sense of “yaay, I did it”, achievement, smugness and celebration that derives from FINALLY doing something that you've always wanted to.Admittedly, I am not a super achiever (and I believe that THAT is the key to my success here)… and the things I'd like to learn or be able to do are regular and mundane - they include growing my own food, learning to cook a meal and being able to sustain a regular workout schedule. Surely, with an additional two hours I now have for each work-from-home day, I will at least be able to attempt some of these previously unachievable feats.I started by scheduling up to two breaks of 15 to 30 minutes on the days when I didn't have to go to the office or out for in person meetings. For each break, I would plan a task/activity that would fit into the time I had available. Here are some examples:With 15 minutes or less:Growing herbs - By adulthood, the list of deceased plants under my watch included countless cacti pots, 10 basil, and 5 mint plants gifted to me at different times. This has led me to conclude that plants do not like me and I gave up trying to care for foliage for more than a decade. With lockdown and remote working, I decided to try growing herbs from cuttings after researching that this method is widely acknowledged to be fool-proof. In the last year, I've composted the carcasses of another 16 basil and four rosemary plants… the difference is this time, I managed to root them myself and keep them alive longer - long enough to harvest a handful of leaves! Mission accomplished… well, kind of. I now have five basil and six rosemary plants, all still green at the time of writing. I think I'm getting Studies
ArsTechnica.webp 2022-05-26 21:00:16 Are we on the verge of an 8K resolution breakthrough in gaming? (lien direct) Studies show extremely diminishing returns from pushing out even more pixels. Studies
TroyHunt.webp 2022-05-04 17:41:22 Discs vs. data: Are we helping the environment by streaming? (lien direct) The number of caveats has only grown since the last few studies were done. Studies
SecurityAffairs.webp 2022-04-15 09:08:13 Ways to Develop a Cybersecurity Training Program for Employees (lien direct) Cybersecurity experts would have you believe that your organization's employees have a crucial role in bolstering or damaging your company’s security initiatives. While you may disagree, data breach studies show that employees and negligence are the most typical causes of security breaches, yet these prevalent issues are least discussed. According to a recent industry report […] Data Breach Studies
zataz.webp 2022-04-12 21:44:40 ISO 27001 : l\'arme fatale face aux pirates ? (lien direct) Un rapport du Center for Strategic and International Studies (CSIS) alarme sur le manque d'action des entreprises face aux cybermenaces des États-nations. Et si la certification ISO 27001:2013 était capable de répondre à ces inquiétudes ?... Studies
itsecurityguru.webp 2022-03-29 10:16:41 86% of organisations believe they have suffered a nation-state cyberattack (lien direct) A new study by Trellix and the Center for Strategic and International Studies (CSIS) has revealed that 86% of organisations believe they have fallen victim to a nation-state cyberattack. The research surveyed 800 IT decision-makers in Australia, France, Germany, India, Japan, the UK and US. It has also been revealed that 92% of respondents have faced, or suspect they […] Studies
TroyHunt.webp 2022-03-18 20:52:57 Some types of brain studies need thousands of participants to be reliable (lien direct) Researchers split up a big, reliable data set to find out where things go wrong. Studies
ArsTechnica.webp 2022-02-18 23:53:43 Omicron subvariant BA.2 continues global rise as experts assess mixed data (lien direct) Lab studies suggest higher pathogenicity, but so far, real-world data on severity doesn't. Studies
Blog.webp 2022-01-27 21:04:26 The GRU\'s galaxy of Russian-speaking websites (lien direct) Since 2016, numerous studies have shown Russian intelligence services’ involvement in online information operations. Case studies on the Internet Research Agency (IRA), Secondary Infektion , and the Ghostwriter campaigns shed light on the methods allegedly employed by the Russian government to influence and discredit beyond its borders. However, little research has focused on Russian Intelligence's […] Studies ★★★
ArsTechnica.webp 2022-01-01 11:55:13 To learn Klingon or Esperanto: What invented languages can teach us (lien direct) NuqneH! Saluton! A linguistic anthropologist studies those who invent new tongues. Studies
ArsTechnica.webp 2021-12-29 23:56:03 Could we build a synthetic digestive system for Vision to make him more human? (lien direct) Also: five Avengers serve as case studies to ponder aging trajectories for superheroes Studies
ArsTechnica.webp 2021-12-22 21:10:29 Omicron cases less likely to require hospital treatment, studies show (lien direct) High rate of infectiousness could still strain hospitals around the world. Studies ★★★
WiredThreatLevel.webp 2021-12-07 13:00:00 Some Cancer Studies Fail to Replicate. That Might Be OK (lien direct) A years-long effort to validate key cancer biology hit roadblocks and found problems. But maybe this will incentivize scientists to share data. Studies
The_Hackers_News.webp 2021-10-18 00:24:49 Is Your Data Safe? Check Out Some Cybersecurity Master Classes (lien direct) Since cybersecurity is definitely an issue that's here to stay, I've just checked out the recently released first episodes of Cato Networks Cybersecurity Master Class Series.  According to Cato, the series aims to teach and demonstrate cybersecurity tools and best practices; provide research and real-world case studies on cybersecurity; and bring the voices and opinions of top cybersecurity Studies
TroyHunt.webp 2021-10-06 20:38:06 Among the Stars documents spacewalks to repair $2 billion particle detector (lien direct) Alpha Magnetic Spectrometer studies cosmic rays from its perch on-board the ISS. Studies
Mandiant.webp 2021-09-14 04:04:51 Grâce à l'objectif de l'analyste: la puissance réelle des services de détection et de réponse gérés
Through the Analyst Lens: The Real Power of Managed Detection and Response Services
(lien direct)
La menace constante de la violation de données fait que les organisations examinent leur capacité à protéger l'entreprise de la prochaine grande attaque.Mais la technologie à elle seule n'a pas réduit votre temps moyen à détecter et à répondre.Selon Craig Robinson, directeur de programme au sein de la pratique de recherche sur les services de sécurité d'IDC \\ et auteur de la dernière étude IDC Marketscape dans les services de détection et de réponse gérés aux États-Unis, «Il y aura de plus en plus de besoin de MDRServices à l'avenir.Dans les talons de la publication IDC Marketscape, je me suis assis avec Craig pour découvrir ce que les clients et les vendeurs voient
The constant threat of data breach has organizations scrutinizing their ability to protect the business from the next big attack. But technology alone won\'t reduce your mean-time-to-detect and respond. According to Craig Robinson, Program Director within IDC\'s Security Services research practice and author of the latest IDC MarketScape study in U.S. Managed Detection and Response (MDR) Services, “there is going to be more and more of a need for MDR Services in the future.” On the heels of the IDC MarketScape publication, I sat down with Craig to discover what customers and vendors are seeing
Data Breach Threat Studies ★★★
WiredThreatLevel.webp 2021-09-11 13:00:00 A Flawed, Strange Covid-19 Origin Theory Is Gaining Traction (lien direct) A spate of studies claim that the disease was circulating in Italy long before the pandemic-but they struggle to support the theory. Studies
TroyHunt.webp 2021-09-10 22:45:55 Unvaccinated are 5X more likely to catch delta, 11X more likely to die (lien direct) Three fresh CDC studies show vaccines holding up against delta. Studies ★★★★
WiredThreatLevel.webp 2021-09-08 11:00:00 Better Data on Ivermectin Is Finally on Its Way (lien direct) Studies have been small and often not great. The best info so far says don't use it, get vaccinated, and hang in there for the more promising meds being tested. Studies
TroyHunt.webp 2021-08-21 11:45:45 Hydrogen lobbyist quits, slams oil companies\' “false claims” about blue hydrogen (lien direct) Recent studies have questioned blue hydrogen's low-carbon bona fides. Studies
kovrr.webp 2021-07-27 00:00:00 Un été des exploits d'été des exploits de ransomware qui ont eu lieu à l'été 2021
A Summer of ExploitsA summary of ransomware exploits that took place in the summer of 2021Read More
(lien direct)
Over the past few weeks several dramatic vulnerabilities were exposed in different ubiquitous products and platforms, including the Microsoft Windows OS, the Solarwinds Serv-U Managed File Transfer and Serv-U Secure FTP products, and Kaseya’s services.‍1. Print Night Mare2. Print Nightmare Update3. Kaseya\'s Clients Important Notice4. CISA\'s public alert5. Reuters Article about Data ransom6. Microsoft\'s emergency patch fails7. SolarWinds Zero-day vulnerability8. SolarWinds alerted by Microsoft9. Kaseya restores services‍Summary of the Events‍KaseyaWhat happened? On July 2nd, a cyber attack was launched against the IT solutions company Kaseya. Kaseya provides IT solutions including VSA, a unified remote-monitoring and management tool for handling networks and endpoints. In addition, the company provides compliance systems, service desks, and a professional services automation platform to over 40,000organizations worldwide.The cyberattack has been attributed to the REvil/Sodinikibi ransomware group whose ransomware was first detected in April 2019. The group’s usual propagation method is phishing emails containing malicious links. Some of the group’s most prominent victim industries in the last two years were healthcare facilities and local governments. REvil has offered a decryption key, allegedly universal - able to unlock all encrypted systems, for the ‘bargain’ price of $70 million via bitcoin (BTC) cryptocurrency. On July 13th, all of REvil’s online activity stopped and the groups data-dump websites were shut down without further information, leaving the victims of their latest attacks hostage with encrypted files and no valid payment address or decryption keys.Who was impacted? On July 2nd Kaseya claimed that the attack affected only a small number of on-premise clients, In a press release published on July 5th the company estimated that the number of clients impacted by the attack is between 800 and 1500 businesses.‍PrintNightmareWhat happened? On June 8th, Microsoft published a CVE advisory for a vulnerability in the Windows PrintSpooler service which is enabled by default in all Windows clients and servers across almost all modern Windows versions. This vulnerability was initially categorized as a low severity local privilege escalation (LPE) vulnerability by Microsoft and a patch for it was released on June 21st. A week later, researchers published a successful PoC of the exploitation and claimed that the vulnerability is in fact a high severity RCE and PE vulnerability. On July 1st, a separate vulnerability in the same Windows Print Spooler service was discovered, similar to the first vulnerability, this new “PrintNightmare’’ was also a RCE andLPE vulnerability that would allow attackers system privileges with which they could install programs; view, change, or delete data; or create new accounts with full user rights.After the high severity of the vulnerability was acknowledged, Microsoft published an out-of band patch on July 6th and claimed to have fully addressed the public vulnerability. However, on July 7th researchers presented additional successful PoCs and claimed that the patch can be bypassed.Who was impacted? This vulnerability affects all modern unpatched client and server versions of Windows.According to Kaspersky, the vulnerability was already exploited but no further information regarding victims is currently available.‍SolarwindsWhat happened? On July 9th, Solarwinds published an announcement claiming that they were informed by Microsoft of an exploited zero-day vulnerability in their Serv-U Managed File Transfer and Serv-U Secure FTP products.On July 10th, Solarwinds released a patch to fix the vulnerability and claimed that this event is unrelated to the Solarwinds supply chain attack that occurred in December of 2020.The vulnerability allows an attacker to run arbitrary code with privileges, and then install programs; view, change, or delete data; or Ransomware Tool Vulnerability Studies ★★★
Anomali.webp 2021-07-20 15:00:00 Anomali Cyber Watch: China Blamed for Microsoft Exchange Attacks, Israeli Cyber Surveillance Companies Help Oppressive Governments, and More (lien direct) The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: China, APT, Espionage, Ransomware, Targeted Campaigns, DLL Side-Loading, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence UK and Allies Accuse China for a Pervasive Pattern of Hacking, Breaching Microsoft Exchange Servers (published: July 19, 2021) On July 19th, 2021, the US, the UK, and other global allies jointly accused China in a pattern of aggressive malicious cyber activity. First, they confirmed that Chinese state-backed actors (previously identified under the group name Hafnium) were responsible for gaining access to computer networks around the world via Microsoft Exchange servers. The attacks took place in early 2021, affecting over a quarter of a million servers worldwide. Additionally, APT31 (Judgement Panda) and APT40 (Kryptonite Panda) were attributed to Chinese Ministry of State Security (MSS), The US Department of Justice (DoJ) has indicted four APT40 members, and the Cybersecurity and Infrastructure Security Agency (CISA) shared indicators of compromise of the historic APT40 activity. Analyst Comment: Network defense-in-depth and adherence to information security best practices can assist organizations in reducing the risk. Pay special attention to the patch and vulnerability management, protecting credentials, and continuing network hygiene and monitoring. When possible, enforce the principle of least privilege, use segmentation and strict access control measures for critical data. Organisations can use Anomali Match to perform real time forensic analysis for tracking such attacks. MITRE ATT&CK: [MITRE ATT&CK] Drive-by Compromise - T1189 | [MITRE ATT&CK] Exploit Public-Facing Application - T1190 | [MITRE ATT&CK] External Remote Services - T1133 | [MITRE ATT&CK] Server Software Component - T1505 | [MITRE ATT&CK] Exploitation of Remote Services - T1210 Tags: Hafnium, Judgement Panda, APT31, TEMP.Jumper, APT40, Kryptonite Panda, Zirconium, Leviathan, TEMP.Periscope, Microsoft Exchange, CVE-2021-26857, CVE-2021-26855, CVE-2021-27065, CVE-2021-26858, Government, EU, UK, North America, China NSO’s Spyware Sold to Authoritarian Regimes Used to Target Activists, Politicians and Journalists (published: July 18, 2021) Israeli surveillance company NSO Group supposedly sells spyware to vetted governments bodies to fight crime and terrorism. New research discovered NSO’s tools being used against non-criminal actors, pro-democracy activists and journalists investigating corruption, political opponents and government critics, diplomats, etc. In some cases, the timeline of this surveillance coincided with journalists' arrests and even murders. The main penetration tool used by NSO is malware Pegasus that targets both iPho Ransomware Malware Tool Vulnerability Threat Studies Guideline Industrial APT 41 APT 40 APT 28 APT 31
Chercheur.webp 2021-07-13 14:04:19 Iranian State-Sponsored Hacking Attempts (lien direct) Interesting attack: Masquerading as UK scholars with the University of London’s School of Oriental and African Studies (SOAS), the threat actor TA453 has been covertly approaching individuals since at least January 2021 to solicit sensitive information. The threat actor, an APT who we assess with high confidence supports Islamic Revolutionary Guard Corps (IRGC) intelligence collection efforts, established backstopping for their credential phishing infrastructure by compromising a legitimate site of a highly regarded academic institution to deliver personalized credential harvesting pages disguised as registration links. Identified targets included experts in Middle Eastern affairs from think tanks, senior professors from well-known academic institutions, and journalists specializing in Middle Eastern coverage... Threat Studies
SecurityWeek.webp 2021-07-13 12:37:09 Iranian Hackers Impersonate British Scholars in Recent Campaign (lien direct) In a recent attack campaign, the Iran-linked threat actor tracked as TA453 has been posing as UK scholars with the University of London's School of Oriental and African Studies (SOAS) to engage targets of interest and steal their credentials, security researchers with Proofpoint reveal. Threat Studies
The_Hackers_News.webp 2021-07-13 02:58:26 Iranian Hackers Posing as Scholars Target Professors and Writers in Middle-East (lien direct) A sophisticated social engineering attack undertaken by an Iranian-state aligned actor targeted think tanks, journalists, and professors with an aim to solicit sensitive information by masquerading as scholars with the University of London's School of Oriental and African Studies (SOAS). Enterprise security firm Proofpoint attributed the campaign - called "Operation SpoofedScholars" - to the Studies
SecurityWeek.webp 2021-06-30 11:39:09 Authorities Lag Against Fast-Evolving Cyberspace Threats: Report (lien direct) Governments worldwide are too often playing catch-up against private cyberspace operators in what is poised to become a key arena for defending national interests, the International Institute for Strategic Studies said Tuesday. Studies
Last update at: 2024-05-13 01:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter