www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-13T02:44:39+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog Derrière les portes fermées: la montée de l'accès à distance malveillant caché<br>Behind Closed Doors: The Rise of Hidden Malicious Remote Access ]]> 2024-05-06T16:15:31+00:00 https://www.cybereason.com/blog/behind-closed-doors-the-rise-of-hidden-malicious-remote-access www.secnews.physaphae.fr/article.php?IdArticle=8494707 False Threat None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: The Source Code of Malicious Life malicious life A few weeks ago we had a listener\'s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship\'s captain in the Israeli Navy - and then about how me and Nate craft the stories that you hear every other week. That last part, I hope, might also be beneficial to those of you, our listeners, who find themselves giving talks about technically complex ideas, cyber-related or not. The storytelling ideas and techniques I laid out in the talk are universal, and you\'ll find them in blockbuster movies as well as podcast episodes. 
malicious life A few weeks ago we had a listener\'s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship\'s captain in the Israeli Navy - and then about how me and Nate craft the stories that you hear every other week. That last part, I hope, might also be beneficial to those of you, our listeners, who find themselves giving talks about technically complex ideas, cyber-related or not. The storytelling ideas and techniques I laid out in the talk are universal, and you\'ll find them in blockbuster movies as well as podcast episodes. ]]>
2024-05-01T13:36:26+00:00 https://www.cybereason.com/blog/the-source-code-of-malicious-life www.secnews.physaphae.fr/article.php?IdArticle=8491927 False None None 3.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: le Y2K Bug Pt.2<br>Malicious Life Podcast: The Y2K Bug Pt. 2 Dans les années décroissantes du 20e siècle, au milieu des angoisses croissantes à propos du tournant du millénaire, un homme, Robert Bemer, a observé le drame qui se déroule de sa maison éloignée sur le lac King Possum.Un chiffre vénéré dans l'informatique, Bemer avait tôt signalé un problème important et imminent connu sous le nom de Bug Y2K, qui menaçait de perturber les systèmes mondiaux alors que les calendriers sont réduits en 2000. Cet épisode plonge dans la vie de Bemer \\ au cours de cette critiquepériode, explorant ses prédictions, la frénésie mondiale qui s'ensuivit pour éviter la catastrophe et les opinions disparates sur le fait que les milliards dépensés en prévention étaient justifiés ou simplement une réponse à une menace mal comprise.
y2k bug In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer\'s life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were justified or merely a response to a misunderstood threat.]]>
2024-04-23T13:17:04+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-y2k-bug-part-2 www.secnews.physaphae.fr/article.php?IdArticle=8487441 False Threat None 3.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: le Y2K Bug Pt.1<br>Malicious Life Podcast: The Y2K Bug Pt. 1 2024-04-01T15:32:50+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-y2k-bug-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8474095 False None None 2.0000000000000000 CybeReason - Vendor blog Alerte de menace: les conséquences de la violation Anydesk<br>Threat Alert: The Anydesk Breach Aftermath Cybearason Problèmes de menace Alertes pour informer les clients de l'émergence des menaces impactantes, y compris les vulnérabilités critiques.Les alertes de menaces de cyberéasie résument ces menaces et fournissent des recommandations pratiques pour se protéger contre elles.
anydesk breach Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them.]]>
2024-03-26T14:39:15+00:00 https://www.cybereason.com/blog/threat-alert-the-anydesk-breach-aftermath www.secnews.physaphae.fr/article.php?IdArticle=8470864 False Vulnerability,Threat None 3.0000000000000000
CybeReason - Vendor blog L'évolution de la cyberisoire pour perturber au-delà du marché Siem et XDR<br>Cybereason\\'s evolution to disrupt beyond SIEM and XDR market cyberison sdr Aujourd'hui, les entreprises accélèrent pour investir dans la numérisation pour rester en avance sur la concurrence.Ils rencontrent de plus en plus un paysage en évolution des menaces et des défis de sécurité complexes - avec plus de charges de travail dans des nuages multiples, plus de main-d'œuvre dans des environnements hybrides et des appareils plus intelligents liés dans les opérations critiques de la mission.Ce parcours de transformation est exacerbé par une augmentation exponentielle des ressources de calcul, des volumes de données et des outils de sécurité, ce qui fait augmenter le coût du stockage, de la gestion et de l'analyse des données à des fins de sécurité.
cybereason sdr Today enterprises are accelerating to invest into digitalization to stay ahead of competition. They are increasingly encountering an evolving threat landscape and complex security challenges - with more workloads in multi clouds, more workforces in hybrid environments, and more intelligent devices connected in mission critical operations. This transformation journey is exacerbated by exponential increase in compute resources, data volumes and security tooling, driving up the cost of storing, managing and analyzing the data for security purposes.]]>
2024-03-25T03:28:07+00:00 https://www.cybereason.com/blog/cybereasons-evolution-to-disrupt-beyond-siem-and-xdr-market www.secnews.physaphae.fr/article.php?IdArticle=8469949 False Threat None 2.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: pouvez-vous bombarder un pirate?<br>Malicious Life Podcast: Can You Bomb a Hacker? Malicious Life Podcast: Can You Bomb a Hacker? ]]> 2024-03-19T18:33:51+00:00 https://www.cybereason.com/blog/malicious-life-podcast-can-you-bomb-a-hacker www.secnews.physaphae.fr/article.php?IdArticle=8466880 False None None 2.0000000000000000 CybeReason - Vendor blog Méfiez-vous des messagers, exploitant la vulnérabilité activeMQ<br>Beware of the Messengers, Exploiting ActiveMQ Vulnerability Cybearason Security Services Problème des rapports d'analyse des menaces pour informer sur l'impact des menaces.Les rapports d'analyse des menaces étudient ces menaces et fournissent des recommandations pratiques pour se protéger contre eux.
activemq vulnerability Cybereason Security Services issues Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]>
2024-03-13T14:50:52+00:00 https://www.cybereason.com/blog/beware-of-the-messengers-exploiting-activemq-vulnerability www.secnews.physaphae.fr/article.php?IdArticle=8463286 False Vulnerability,Threat None 2.0000000000000000
CybeReason - Vendor blog Combler l'écart: équilibrer la conformité et l'innovation en matière de sécurité en cybersécurité<br>Bridging the Gap: Balancing Security Compliance and Innovation in Cybersecurity cyberison on-prém En tant qu'ex-Amazonien (AWS) et Native Native par passion, je n'ai jamais pensé écrire un article de blog comme celui qui suit.Mais je suis aussi un défenseur, un passionné de cybersécurité et surtout obsédé par le client et donc je reconnais que le monde n'est pas en noir et blanc, mais il est coloré avec un large éventail de couleurs et plusieurs nuances.Il en va de même pour les exigences des entreprises.Cela nous amène aux questions:
Cybereason On-Prem As an Ex-Amazonian (AWS) and cloud-native guy by passion, I never thought I would write a blog post like the following. But I\'m also a Defender, a cyber security enthusiast and most of all customer obsessed and therefore I recognize that the world is not black and white, instead it\'s colorful with a wide range of colors and several nuances. So are the requirements from companies. This leads us to the questions:]]>
2024-03-06T14:00:00+00:00 https://www.cybereason.com/blog/bridging-the-gap-balancing-security-compliance-and-innovation-in-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8459910 False None None 2.0000000000000000
CybeReason - Vendor blog Débloquer Snake - Python InfostEaler qui se cache à travers les services de messagerie<br>Unboxing Snake - Python Infostealer Lurking Through Messaging Services smale python infosaler Les services de sécurité de la cyberison des problèmes d'analyse des menaces pour informer les menaces.Les rapports d'analyse des menaces étudient ces menaces et fournissent des recommandations pratiques pour se protéger contre eux.
smale python infostealer Cybereason Security Services issues Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]>
2024-03-05T14:41:54+00:00 https://www.cybereason.com/blog/unboxing-snake-python-infostealer-lurking-through-messaging-service www.secnews.physaphae.fr/article.php?IdArticle=8459406 False Threat None 2.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: Kevin Mitnick, partie 2<br>Malicious Life Podcast: Kevin Mitnick, Part 2 2024-03-01T17:40:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-kevin-mitnick-part-2 www.secnews.physaphae.fr/article.php?IdArticle=8458967 False None None 2.0000000000000000 CybeReason - Vendor blog Ransomware: véritable coût pour les entreprises 2024<br>Ransomware: True Cost to Business 2024 Ransomware: True Cost to Business 2024 ]]> 2024-02-21T21:57:49+00:00 https://www.cybereason.com/blog/ransomware-true-cost-to-business-2024 www.secnews.physaphae.fr/article.php?IdArticle=8453397 False Ransomware,Studies None 4.0000000000000000 CybeReason - Vendor blog Annonce de la cyberison sur site<br>Announcing Cybereason On-Prem 2024-02-20T17:29:26+00:00 https://www.cybereason.com/blog/announcing-cybereason-on-prem www.secnews.physaphae.fr/article.php?IdArticle=8452846 False None None 2.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillante: Kevin Mitnick, partie 1<br>Malicious Life Podcast: Kevin Mitnick, Part 1 Malicious Life Podcast: Kevin Mitnick, Part 1 ]]> 2024-02-19T21:39:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-kevin-mitnick-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8453850 False None None 3.0000000000000000 CybeReason - Vendor blog De Cracked à piraté: les logiciels malveillants se propagent via des vidéos YouTube<br>From Cracked to Hacked: Malware Spread via YouTube Videos YouTube Malware Vector Ce rapport d'analyse des menaces se plongera dans les comptes YouTube compromis utilisés comme vecteur pour la propagation des logiciels malveillants.Il décrira comment ce vecteur d'attaque est exploité pour les campagnes à faible combustion et à faible coût, mettant en évidence les stratégies utilisées par les acteurs de la menace et comment les défenseurs peuvent détecter et prévenir ces attaques. & NBSP;
youtube malware vector This Threat Analysis Report will delve into compromised YouTube accounts being used as a vector for the spread of malware. It will outline how this attack vector is exploited for low-burn, low-cost campaigns, highlighting strategies used by threat actors and how defenders can detect and prevent these attacks. ]]>
2024-02-12T16:37:24+00:00 https://www.cybereason.com/blog/from-cracked-to-hacked-malware-spread-via-youtube-videos www.secnews.physaphae.fr/article.php?IdArticle=8449326 False Malware,Threat None 3.0000000000000000
CybeReason - Vendor blog Alerte de menace: Ivanti Connect Secure VPN Zero-Day Exploitation<br>THREAT ALERT: Ivanti Connect Secure VPN Zero-Day Exploitation ivanti vpn zero day exploit Cybereason Issues Menace Alertes pour informer les clients de l'émergence des menaces impactantes, y compris des vulnérabilités critiques telles que l'exploitation Ivanti Secure VPN Zero-Day.Les alertes de menaces de cyberéasie résument ces menaces et fournissent des recommandations pratiques pour se protéger contre elles.
ivanti VPN Zero Day Exploit Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities such as the Ivanti Connect Secure VPN Zero-Day exploitation. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them.]]>
2024-02-06T04:35:35+00:00 https://www.cybereason.com/blog/threat-alert-ivanti-connect-secure-vpn-zero-day-exploitation www.secnews.physaphae.fr/article.php?IdArticle=8447166 False Vulnerability,Threat None 2.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: Enregistrement SIM: Sécurité ou surveillance?<br>Malicious Life Podcast: SIM Registration: Security, or Surveillance? 2024-02-05T20:53:17+00:00 https://www.cybereason.com/blog/malicious-life-podcast-sim-registration-security-or-surveillance www.secnews.physaphae.fr/article.php?IdArticle=8447072 False None None 2.0000000000000000 CybeReason - Vendor blog THREAT ALERT: DarkGate Loader darkgate loader Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including recently observed DarkGate Loader. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them.
darkgate loader Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including recently observed DarkGate Loader. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them.]]>
2024-01-29T15:39:52+00:00 https://www.cybereason.com/blog/threat-alert-darkgate-loader www.secnews.physaphae.fr/article.php?IdArticle=8444479 False Threat None 3.0000000000000000
CybeReason - Vendor blog Podcast de vie malveillante: le botnet Mariposa<br>Malicious Life Podcast: The Mariposa Botnet 2024-01-22T17:58:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-mariposa-botnet www.secnews.physaphae.fr/article.php?IdArticle=8442224 False None None 3.0000000000000000 CybeReason - Vendor blog Qu'est-ce que les esprits les plus intelligents de la cybersécurité pour 2024?<br>What\\'s on the Smartest Cybersecurity Minds for 2024? What\'s on the Smartest Cybersecurity Minds for 2024? ]]> 2024-01-16T15:14:10+00:00 https://www.cybereason.com/blog/whats-on-the-smartest-cybersecurity-minds-for-2024 www.secnews.physaphae.fr/article.php?IdArticle=8439634 False None None 3.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillante: la vraie histoire du piratage de 10 millions de dollars de Citibank \\<br>Malicious Life Podcast: The Real Story of Citibank\\'s $10M Hack Citibank hack Valdimir Levin est souvent présenté comme "le premier voleur de banque en ligne" et apparaît sur de nombreuses listes des "10 meilleurs pirates de pirates".Mais quelques pirates vétérans russes CLIAM que le tristement célèbre piratage de Levin avait été mutilé par les Journlists qui ont écrit à ce sujet.Quelle est la vérité derrière le hack Citibank de 10,7 millions de dollars en 1994?…
Citibank Hack Valdimir Levin is often presented as "the first online bank robber," and appeares on many lists of the "Top 10 Greatest Hackers." But a few veteran Russian hackers cliam that Levin\'s infamous hack had been mangled by the journlists who wrote about it. What\'s the truth behind the 1994 $10.7 million Citibank hack?…]]>
2024-01-09T17:57:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-real-story-of-citibanks-10m-hack www.secnews.physaphae.fr/article.php?IdArticle=8442225 False Hack None 3.0000000000000000
CybeReason - Vendor blog Podcast de la vie malveillante: NSO est-il mal?Partie 1<br>Malicious Life Podcast: Is NSO Evil? Part 1 Malicious Life Podcast: Is NSO Evil? Part 1 ]]> 2024-01-08T22:01:59+00:00 https://www.cybereason.com/blog/malicious-life-podcast-is-nso-evil-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8436908 False None None 3.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillante: devriez-vous payer des attaquants de ransomwares?Une approche de théorie des jeux<br>Malicious Life Podcast: Should You Pay Ransomware Attackers? A Game Theory Approach Malicious Life Podcast: Should You Pay Ransomware Attackers? A Game Theory Approach ]]> 2024-01-08T22:01:58+00:00 https://www.cybereason.com/blog/malicious-life-podcast-should-you-pay-ransomware-attackers-a-game-theory-approach www.secnews.physaphae.fr/article.php?IdArticle=8436909 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillante: Opération Kudo<br>Malicious Life Podcast: Operation Kudo Malicious Life Podcast: Operation Kudo ]]> 2024-01-08T22:01:56+00:00 https://www.cybereason.com/blog/malicious-life-podcast-operation-kudo www.secnews.physaphae.fr/article.php?IdArticle=8436910 False None None 3.0000000000000000 CybeReason - Vendor blog Alerte de menace: Citriced (CVE-2023-4966)<br>THREAT ALERT: CITRIXBLEED (CVE-2023-4966) THREAT ALERT: CITRIXBLEED (CVE-2023-4966) ]]> 2023-12-18T16:09:11+00:00 https://www.cybereason.com/blog/threat-alert-citrixbleed-cve-2023-4966 www.secnews.physaphae.fr/article.php?IdArticle=8424932 False Threat None 2.0000000000000000 CybeReason - Vendor blog Alerte de menace: variante DJVU livrée par le chargeur se faisant passer pour un logiciel gratuit<br>THREAT ALERT: DJvu Variant Delivered by Loader Masquerading as Freeware THREAT ALERT: DJvu Variant Delivered by Loader Masquerading as Freeware ]]> 2023-11-28T15:41:00+00:00 https://www.cybereason.com/blog/threat-alert-djvu-variant-delivered-by-loader-masquerading-as-freeware www.secnews.physaphae.fr/article.php?IdArticle=8417601 False Threat None 3.0000000000000000 CybeReason - Vendor blog 2024 Prédictions de la cybersécurité - L'IA générative remodèle la cybersécurité<br>2024 Cybersecurity Predictions - Generative AI Reshapes Cybersecurity 2023-11-27T16:07:26+00:00 https://www.cybereason.com/blog/2024-cybersecurity-predictions-generative-ai-reshapes-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=8417298 False Prediction,Cloud None 2.0000000000000000 CybeReason - Vendor blog Alerte de menace: Ransomware INC<br>THREAT ALERT: INC Ransomware THREAT ALERT: INC Ransomware ]]> 2023-11-20T18:11:31+00:00 https://www.cybereason.com/blog/threat-alert-inc-ransomware www.secnews.physaphae.fr/article.php?IdArticle=8415051 False Ransomware,Threat None 3.0000000000000000 CybeReason - Vendor blog Sécurité des informations du réseau de l'UE<br>EU Network Information Security EU Network Information Security ]]> 2023-10-25T13:30:00+00:00 https://www.cybereason.com/blog/eu-network-information-security www.secnews.physaphae.fr/article.php?IdArticle=8400165 False None None 2.0000000000000000 CybeReason - Vendor blog 2023 Détection et réponse prolongée (XDR) Guide de l'acheteur \\<br>2023 Extended Detection & Response (XDR) Buyer\\'s Guide 2023-10-24T13:00:00+00:00 https://www.cybereason.com/blog/2023-extended-detection-response-xdr-buyers-guide www.secnews.physaphae.fr/article.php?IdArticle=8399765 False None None 2.0000000000000000 CybeReason - Vendor blog Toute la sécurité EPP n'est pas la même - changer le garde!<br>NOT all EPP Security is the Same - Changing the Guard! Toute la sécurité EPP n'est pas la même - changer la garde! Lorsque j'ai commencé à antivirus en 1991, la solution était simple: trouver un identifiant unique pour détecter les logiciels malveillants, alors vous pouvez le bloquer et si nécessaire, inciter les bonnes étapes programmatiques pour récupérer.Alan Salomon dirait que c'est un problème mathématique, nous avons la solution, et nous pouvons l'étendre infiniment.Cependant, au fil des ans, les menaces, les solutions et les environnements dans lesquels nous les déployons sont devenus de plus en plus complexes.Nous sommes passés à partir de virus de fichiers qui étaient un objet simple à des attaques de ransomwares multiples complexes composées de centaines d'éléments.Tout comme un exemple si vous regardez le Dernier test de mitres , il a utilisé Turla qui est composé de 143objets (indicateurs & amp; comportements liés à l'attaque). & nbsp;
NOT all EPP Security is the Same - Changing the Guard! When I started in anti-virus back in 1991, the solution was simple: find a unique identifier to detect the malware, then you could block it and if needed instigate the right programmatic steps to recover. Alan Solomon would say it\'s a math problem, we have the solution, and we can scale it infinitely. However, over the years threats, the solutions and the environments we deploy them into have become ever more complex. We have moved from file viruses that were one simple object to complex multifaceted ransomware attacks made up of hundreds of elements. Just as an example if you look at the latest MITRE testing, it used Turla which is made up of 143 objects (Indicators & behaviors linked to the attack). ]]>
2023-10-23T14:03:56+00:00 https://www.cybereason.com/blog/not-all-epp-security-is-the-same-changing-the-guard www.secnews.physaphae.fr/article.php?IdArticle=8399319 False Ransomware None 3.0000000000000000
CybeReason - Vendor blog Analyse des menaces: prendre des raccourcis… en utilisant des fichiers LNK pour l'infection initiale et la persistance<br>THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence THREAT ANALYSIS: Taking Shortcuts… Using LNK Files for Initial Infection and Persistence ]]> 2023-10-06T17:53:23+00:00 https://www.cybereason.com/blog/threat-analysis-taking-shortcuts-using-lnk-files-for-initial-infection-and-persistence www.secnews.physaphae.fr/article.php?IdArticle=8392318 False Threat None 3.0000000000000000 CybeReason - Vendor blog La cyberison établit la nouvelle norme de l'industrie en 2023 Évaluations de Mitre ATT & CK: Enterprise<br>Cybereason Sets the New Industry Standard in 2023 MITRE ATT&CK Evaluations: Enterprise cyberison établit la nouvelle norme de l'industrie en 2023 mitre att & amp; CK Evaluations: Enterprise Fresh Off the Press: Les résultats de la 2023 MITER ENNÉNUITION ATT & AMP; CK & reg; Évaluations: Entreprise ont été publiés, mettant 30 solutions de sécurité au test dans des scénarios réels qui imitent l'acteur de la menace Turla.
Cybereason Sets the New Industry Standard in 2023 MITRE ATT&CK Evaluations: Enterprise Fresh off the press: the results of the 2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise have been published, putting 30 security solutions to the test in real world scenarios that mimic the Turla threat actor.]]>
2023-09-20T13:10:48+00:00 https://www.cybereason.com/blog/cybereason-delivers-100-scores-in-2023-mitre-attck-evaluations-for-enterprise www.secnews.physaphae.fr/article.php?IdArticle=8385858 False Threat None 2.0000000000000000
CybeReason - Vendor blog La capacité de cybersécurité que l'industrie a presque oublié<br>The Cybersecurity Capability the Industry Nearly Forgot La capacité de cybersécurité L'industrie a presque oublié Lorsque j'ai commencé en cybersécurité au début des 90 \\, des capacités de cybersécurité entières n'étaient que quelques Mo de taille et s'adapteraient sur quelques disquettes.Aujourd'hui, de nombreuses capacités de cybersécurité sont si grandes et complexes qu'elles s'appuient sur le cloud computing, soit pour la vitesse de traitement, soit la possibilité de tirer parti de grands ensembles de données utilisés par exemple avec l'apprentissage automatique dans le cadre des capacités de détection et de réponse. & Nbsp; & nbsp;
The Cybersecurity Capability the Industry Nearly Forgot When I started in cybersecurity back in the early 90\'s, entire cyber security capabilities were just a couple of MB in size and would fit on a couple of floppy disks. Today, many cyber security capabilities are so big and complex that they rely on cloud computing, either for processing speed or the ability to leverage large data sets used in for example with Machine Learning as part of the detection and response capabilities.  ]]>
2023-09-13T14:47:38+00:00 https://www.cybereason.com/blog/the-cybersecurity-capability-the-industry-nearly-forgot www.secnews.physaphae.fr/article.php?IdArticle=8382328 False Cloud None 2.0000000000000000
CybeReason - Vendor blog Podcast Malicious Life : L’IA générative est-elle dangereuse ?<br>Malicious Life Podcast: Is Generative AI Dangerous?  Podcast Malicious Life : l'IA générative est-elle dangereuse ? De temps en temps, l'ensemble du paysage de la cybersécurité change d'un seul coup : le dernier changement sismique dans le domaine s'est produit l'année dernière seulement.Ainsi, dans cet épisode de Malicious Life, nous allons nous pencher sur l'avenir de la cybersécurité : comment l'IA générative comme ChatGPT va changer le cyberespace, à travers les yeux de cinq équipes de recherche innovatrices dans le domaine.Nous commencerons par des choses simples, puis nous passerons progressivement à des exemples de plus en plus complexes et futuristes montrant comment cette technologie pourrait bien se retourner contre nous, nous obligeant à résoudre des problèmes que nous n'avions jamais envisagés auparavant. – ;vérifiez-le...
Malicious Life Podcast: Is Generative AI Dangerous? Every so often, the entire landscape of cybersecurity shifts, all at once: The latest seismic shift in the field occurred just last year. So in this episode of Malicious Life we\'re going to take a look into the future of cybersecurity: at how generative AI like ChatGPT will change cyberspace, through the eyes of five research teams breaking ground in the field. We\'ll start off simple, and gradually build to increasingly more complex, more futuristic examples of how this technology might well turn against us, forcing us to solve problems we\'d never considered before. – check it out...]]>
2023-08-22T20:24:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-is-generative-ai-dangerous www.secnews.physaphae.fr/article.php?IdArticle=8376432 False None ChatGPT,ChatGPT 2.0000000000000000
CybeReason - Vendor blog Analyse des menaces: assembler Lockbit 3.0<br>THREAT ANALYSIS: Assemble LockBit 3.0 THREAT ANALYSIS: Assemble LockBit 3.0 ]]> 2023-08-21T20:45:00+00:00 https://www.cybereason.com/blog/threat-analysis-assemble-lockbit-3 www.secnews.physaphae.fr/article.php?IdArticle=8372917 False Threat None 2.0000000000000000 CybeReason - Vendor blog Étendre la détection et la réponse des nuages avec Sysdig et Cybearon<br>Extend Cloud Detection and Response with Sysdig and Cybereason Extend Cloud Detection and Response with Sysdig and Cybereason ]]> 2023-08-09T13:00:00+00:00 https://www.cybereason.com/blog/extend-cloud-detection-and-response-with-sysdig-and-cybereason www.secnews.physaphae.fr/article.php?IdArticle=8367905 False Cloud None 2.0000000000000000 CybeReason - Vendor blog Podcast de vie malveillant: pourquoi y est-il plus de programmes de primes de bug?<br>Malicious Life Podcast: Why aren\\'t there more bug bounty programs? Malicious Life Podcast: Why aren\'t there more bug bounty programs? ]]> 2023-08-08T16:36:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-why-arent-there-more-bug-bounty-programs www.secnews.physaphae.fr/article.php?IdArticle=8370847 False None None 2.0000000000000000 CybeReason - Vendor blog Le nouveau tableau de bord Unified Malop de Cybereason \\<br>Cybereason\\'s New Unified MalOp Dashboard Cybereason DefensePlatform Unified Malop Dashboard Cybearason est ravi d'annoncer un nouveau tableau de bord Unified Malop Alors que les cybermenaces continuent d'évoluer, les équipes du Centre des opérations de sécurité (SOC) sont confrontées à d'immenses défis dans la protection de leurs organisations.Pour réussir, SOC a besoin non seulement de la bonne technologie, mais aussi un effet de levier efficace des personnes et des processus.Pour aider les équipes SOC à rester en avance sur la courbe, la cyber-saison introduit un tableau de bord unifié conçu pour fournir des informations supplémentaires sur les menaces émergentes, les mesures opérationnelles et fournir des informations pour améliorer continuellement les processus et les procédures du SoC.
cybereason defense platform Unified Malop Dashboard Cybereason is excited to announce a new unified Malop Dashboard As cyber threats continue to evolve, Security Operations Center (SOC) teams face immense challenges in protecting their organizations. To be successful SOC needs not only the right technology but effective leverage of people and processes. To help SOC teams stay ahead of the curve, Cybereason introduces a unified dashboard designed to provide additional insights into emerging threats, operational metrics and provide insights to continuously improve SOC processes and procedures.]]>
2023-07-07T14:20:36+00:00 https://www.cybereason.com/blog/cybereasons-new-unified-malop-dashboard www.secnews.physaphae.fr/article.php?IdArticle=8353396 False None None 2.0000000000000000
CybeReason - Vendor blog XDR en 2023: Knight de Cybersecurity \\ ou un autre château dans le nuage?<br>XDR in 2023: Cybersecurity\\'s Knight or Another Castle in the Cloud? xdr cybersecurity 3 questions clés lorsque vous investissez dans des offres XDR Dans le paysage de la cybersécurité d'aujourd'hui, les équipes de sécurité ont besoin d'une plate-forme de détection et de réponse unifiée.Cependant, même avec l'avènement de XDR, les résultats ne sont souvent pas des attentes.Nous recherchons une prévention efficace, une émulation d'attaque, une amélioration et des rapports positifs sur le retour sur investissement.Sans aucun doute, le domaine de l'ingénierie à distance ajoute de la complexité, ce qui rend crucial pour protéger nos employés, nos données et maintenir la disponibilité.Dans le contexte des pressions commerciales de montage, nous devons comprendre comment XDR peut aider à la consolidation des fournisseurs et à la détection et à la réponse gérées.
XDR Cybersecurity 3 Key Questions when Investing in XDR offerings In today\'s cybersecurity landscape, security teams are in dire need of a unified detection and response platform. However, even with the advent of XDR, the outcomes often fall short of expectations. We strive for effective prevention, attack emulation, improvement, and positive ROI reporting. No doubt, the realm of remote engineering adds complexity, making it crucial to protect our employees, data, and maintain uptime. Against a backdrop of mounting business pressures, we need to understand how XDR can help with vendor consolidation and Managed Detection and Response.]]>
2023-06-21T13:39:09+00:00 https://www.cybereason.com/blog/xdr-in-2023-cybersecuritys-knight-or-another-castle-in-the-cloud www.secnews.physaphae.fr/article.php?IdArticle=8347733 False None None 3.0000000000000000
CybeReason - Vendor blog Fondations XDR: éliminer les données de cybersécurité fragmentées<br>XDR Foundations: Eliminating Fragmented Cybersecurity Data XDR Foundations: Eliminating Fragmented Cybersecurity Data ]]> 2023-05-03T16:20:43+00:00 https://www.cybereason.com/blog/xdr-foundations-eliminating-fragmented-cybersecurity-data www.secnews.physaphae.fr/article.php?IdArticle=8333248 False None None 2.0000000000000000 CybeReason - Vendor blog Fondations XDR: tirer parti de l'IA là où cela compte le plus<br>XDR Foundations: Leveraging AI Where it Matters Most XDR Foundations: Leveraging AI Where it Matters Most ]]> 2023-05-01T18:33:48+00:00 https://www.cybereason.com/blog/xdr-foundations-leveraging-ai-where-it-matters-most www.secnews.physaphae.fr/article.php?IdArticle=8332612 False None None 2.0000000000000000 CybeReason - Vendor blog La cyberréason annonce la chasse et l'enquête unifiées aux menaces<br>Cybereason Announces Unified Threat Hunting and Investigation Cybearon annonce la chasse et l'enquête unifiées à la menace La cyberréasie est ravie d'annoncer un développement significatif dans son approche pour stocker des données de chasse à long terme (télémétrie collectée par nos capteurs pas \\ 'Données bénignes \' détectées par et liées à un malveillantOpération, ou ]]> 2023-04-26T14:16:20+00:00 https://www.cybereason.com/blog/cybereason-announces-unified-threat-hunting-and-investigation www.secnews.physaphae.fr/article.php?IdArticle=8331281 False Threat None 2.0000000000000000 CybeReason - Vendor blog All Things Cybereason à la conférence RSA 2023<br>All Things Cybereason at 2023 RSA Conference All Things Cybereason at 2023 RSA Conference ]]> 2023-04-18T14:58:36+00:00 https://www.cybereason.com/blog/all-things-cybereason-at-2023-rsa-conference www.secnews.physaphae.fr/article.php?IdArticle=8328957 False Conference None 2.0000000000000000 CybeReason - Vendor blog Cybearason obtient un financement de 100 millions de dollars, nomme un nouveau PDG<br>Cybereason Secures $100M Funding, Appoints New CEO 2023-04-03T13:40:01+00:00 https://www.cybereason.com/blog/cybereason-secures-100m-funding-and-new-ceo www.secnews.physaphae.fr/article.php?IdArticle=8324377 False None None 2.0000000000000000 CybeReason - Vendor blog La cyberison détecte et empêche l'attaque de la chaîne d'approvisionnement du 3CXDESKTOPAPPAPPAPPAP [Cybereason Detects and Prevents 3CXDesktopApp Supply Chain Attack] Cybereason Detects and Prevents 3CXDesktopApp Supply Chain Attack ]]> 2023-03-31T15:08:17+00:00 https://www.cybereason.com/blog/cybereason-detects-and-prevents-3cxdesktopapp-supply-chain-attack www.secnews.physaphae.fr/article.php?IdArticle=8323802 False None None 2.0000000000000000 CybeReason - Vendor blog 5 Steps to More Effective Ransomware Response 5 Steps to More Effective Ransomware Response ]]> 2023-03-15T11:30:00+00:00 https://www.cybereason.com/blog/5-steps-to-more-effective-ransomware-response www.secnews.physaphae.fr/article.php?IdArticle=8318771 False Ransomware,Ransomware None 3.0000000000000000 CybeReason - Vendor blog New Study: Ransomware Driving SOC Modernization Requirements New Study: Ransomware Driving SOC Modernization Requirements ]]> 2023-03-14T10:00:00+00:00 https://www.cybereason.com/blog/how-ransomware-is-driving-soc-modernization-requirements www.secnews.physaphae.fr/article.php?IdArticle=8318401 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Visibility, Response, and Private Infrastructure Protection: Why Cybereason is a 2022 Gartner® Magic Quadrant™ Leader Visibility, Response, and Private Infrastructure Protection: Why Cybereason is a 2022 Gartner® Magic Quadrant™ Leader ]]> 2023-03-09T15:20:53+00:00 https://www.cybereason.com/blog/why-cybereason-is-a-2022-gartner-magic-quadrant-leader www.secnews.physaphae.fr/article.php?IdArticle=8316959 False Guideline None 2.0000000000000000 CybeReason - Vendor blog U.S. National Cybersecurity: Strategy at an Inflection Point Biden Cybersecurity Strategy The Biden administration issued a new cybersecurity strategy last week that has many observers applauding its emphasis on regulating minimum cybersecurity standards and enforcing so-called secure by design development practices, among other things. ]]> 2023-03-08T12:58:50+00:00 https://www.cybereason.com/blog/u.s.-national-cybersecurity-strategy-at-an-inflection-point www.secnews.physaphae.fr/article.php?IdArticle=8316696 False General Information None 2.0000000000000000 CybeReason - Vendor blog Variant Payload Prevention: Applying Data Science to Stop the Stealthiest Threats Variant Payload Prevention: Applying Data Science to Stop the Stealthiest Threats ]]> 2023-03-03T13:00:00+00:00 https://www.cybereason.com/blog/variant-payload-prevention-fuzzy-similarity www.secnews.physaphae.fr/article.php?IdArticle=8315297 False None None 2.0000000000000000 CybeReason - Vendor blog Cybereason Named a Leader in 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms Cybereason Named a Leader in 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms ]]> 2023-02-28T13:04:02+00:00 https://www.cybereason.com/blog/cybereason-named-a-leader-in-2022-gartner-magic-quadrant-for-endpoint-protection-platforms www.secnews.physaphae.fr/article.php?IdArticle=8315039 False Guideline None 2.0000000000000000 CybeReason - Vendor blog New Studies Paint Bleak Picture of Future SOC Effectiveness New Studies Paint Bleak Picture of Future SOC Effectiveness ]]> 2023-02-23T21:33:59+00:00 https://www.cybereason.com/blog/new-studies-paint-bleak-picture-of-future-soc-effectiveness www.secnews.physaphae.fr/article.php?IdArticle=8313011 False Studies None 3.0000000000000000 CybeReason - Vendor blog Ransomware Shifting to the Cloud Ransomware Shifting to the Cloud In the last few years, ransomware attacks have grown considerably. With 75% of organizations being attacked, it seems likely that we'll see a saturation point soon. And attackers have not been resting on their laurels. On the contrary, they have continued to evolve ransomware and are already in the fourth generation of this malicious software.]]> 2023-02-14T19:20:18+00:00 https://www.cybereason.com/blog/ransomware-shifting-to-the-cloud www.secnews.physaphae.fr/article.php?IdArticle=8310202 False Ransomware None 2.0000000000000000 CybeReason - Vendor blog THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise The Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader through heavily-obfuscated JavaScript files. In addition to the new techniques used to load GootLoader, Cybereason also observed Cobalt Strike deployment, which leveraged DLL Hijacking, on top of a VLC MediaPlayer executable. ]]> 2023-02-07T18:17:40+00:00 https://www.cybereason.com/blog/threat-alert-gootloader-seo-poisoning-and-large-payloads-leading-to-compromise www.secnews.physaphae.fr/article.php?IdArticle=8308008 False Threat,Guideline None 3.0000000000000000 CybeReason - Vendor blog Cybereason advances prevention, data collection, investigation, and management capabilities Cybereason advances prevention, data collection, investigation, and management capabilities ]]> 2023-02-06T17:41:48+00:00 https://www.cybereason.com/blog/cybereason-advances-prevention-data-collection-investigation-and-management-capabilities www.secnews.physaphae.fr/article.php?IdArticle=8307614 False General Information None 3.0000000000000000 CybeReason - Vendor blog You Should Be Afraid of SIM Swaps You Should Be Afraid of SIM Swaps If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it's over, you never know if your attackers -- whoever they are -- will come back again. ]]> 2023-01-31T18:19:20+00:00 https://www.cybereason.com/blog/you-should-be-afraid-of-sim-swaps www.secnews.physaphae.fr/article.php?IdArticle=8305964 False None None 3.0000000000000000 CybeReason - Vendor blog FBI vs. REvil [ML BSide] FBI vs. REvil [ML BSide] ]]> 2023-01-24T15:17:03+00:00 https://www.cybereason.com/blog/fbi-vs.-revil-ml-bside www.secnews.physaphae.fr/article.php?IdArticle=8303743 False None None 5.0000000000000000 CybeReason - Vendor blog Cyberbunker, Part 2 Cyberbunker, Part 2 Spamhaus's decision to add Cyberbunker to its list of Spam sources led the Stophaus coalition to initiate a DDoS attack later dubbed “The attack that almost broke the Internet.” The fallout from this attack led to Cyberbunker relocating to a bunker in Germany - but it was the involvement of an Irish drug lord known as 'The Penguin' that led to the bullet-proof hosting company's downfall. ]]> 2023-01-20T17:11:49+00:00 https://www.cybereason.com/blog/cyberbunker-part-2 www.secnews.physaphae.fr/article.php?IdArticle=8302899 False Spam None 2.0000000000000000 CybeReason - Vendor blog 7 Requirements for a Successful XDR Strategy 7 Requirements for a Successful XDR Strategy ]]> 2023-01-19T14:00:00+00:00 https://www.cybereason.com/blog/7-requirements-for-a-successful-xdr-strategy www.secnews.physaphae.fr/article.php?IdArticle=8302593 False None None 2.0000000000000000 CybeReason - Vendor blog Sliver C2 Leveraged by Many Threat Actors Sliver C2 Leveraged by Many Threat Actors What you need to know about this attack framework before it replaces Cobalt Strike ]]> 2023-01-19T13:00:00+00:00 https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors www.secnews.physaphae.fr/article.php?IdArticle=8302538 False Threat None 5.0000000000000000 CybeReason - Vendor blog RSA Conference 2023 Promises New Concepts, Diversity of Ideas RSA Conference 2023 Promises New Concepts, Diversity of Ideas The new year is always a time to reflect on what's coming next. As part of the RSA Conference program committee (having worked on the Hackers & Threats track for a number of years), I'm very privileged to see everyone's perspectives. This year I'm happy to report there was a significant growth in the number of submissions suggesting that the collective is starting to look beyond Covid, which definitely hampered the volume and creativity of solutions in recent years.]]> 2023-01-17T15:21:04+00:00 https://www.cybereason.com/blog/rsa-conference-2023-promises-new-concepts-diversity-of-ideas www.secnews.physaphae.fr/article.php?IdArticle=8301896 False None None 2.0000000000000000 CybeReason - Vendor blog Cyberbunker, Part 1 Cyberbunker, Part 1 Sven Kamphuis and Herman Johan Xennt are quite dissimilar: one is young, the other is old, one is a Freedom Fighter, the other a businessman. In 1996, their unlikely partnership coalesced around a mutual deep hatred towards authority - and around a very unusual building: a Cold-War era nuclear bunker.   ]]> 2023-01-11T19:45:06+00:00 https://www.cybereason.com/blog/cyberbunker-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8300307 False None None 2.0000000000000000 CybeReason - Vendor blog THREAT ANALYSIS: From IcedID to Domain Compromise THREAT ANALYSIS: From IcedID to Domain Compromise BACKGROUND In this Threat Analysis report, the Cybereason team investigates a recent IcedID infection that illustrates the tactics, techniques, and procedures (TTPs) used in a recent campaign. IcedID, also known as BokBot, is traditionally known as a banking trojan used to steal financial information from its victims. It has been around since at least 2017 and has been tied to the threat group TA551. ]]> 2023-01-10T12:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-from-icedid-to-domain-compromise www.secnews.physaphae.fr/article.php?IdArticle=8299550 False Threat None 4.0000000000000000 CybeReason - Vendor blog MITRE ATT&CK and the Art of Building Better Defenses MITRE ATT&CK and the Art of Building Better Defenses MITRE's Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a critical tool for security practitioners seeking to understand how attackers move, operate, and conduct their attacks. Designed to look at attacks from the attacker's perspective, it catalogs the attack lifecycle of different adversaries and the platforms they choose to target, all based on real-world observations.]]> 2023-01-09T18:47:58+00:00 https://www.cybereason.com/blog/mitre-attck-and-the-art-of-building-better-defenses www.secnews.physaphae.fr/article.php?IdArticle=8299313 False Tool None 2.0000000000000000 CybeReason - Vendor blog How Netflix Learned Cloud Security [ML B-Side] How Netflix Learned Cloud Security [ML B-Side] 2011 was a pivotal year for Netflix: the now hugely successful company was then in the midst of a formidable transformation, changing from a mail-based DVD rental service to the modern streaming service that it is today. It was at this crucial point in the company's history that Jason Chan, our guest in this episode, was hired by Netflix to lay the foundations for its cloud security protocols. Nate Nelson, our Sr. Producer, spoke with Jason about the decade he spent at the company, what he learned during his tenure there, and the ideas that took shape at that time, such as Chaos Engineering. ]]> 2023-01-03T17:01:06+00:00 https://www.cybereason.com/blog/how-netflix-learned-cloud-security-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8297497 False None None 2.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] In his 1984 seminal paper - Computer Viruses: Theory and Experiments - Dr. Fred Cohen not only introduced the name 'computer virus', a term invented by his mentor, Leonard Adelman, but was also the first to analyze computer viruses in a rigorous mathematical way, proving that computer viruses were not only practical - but that they were in fact inevitable. Nate Nelson, our Sr. producer, spoke with Dr. Cohen about his early research into computer viruses, his work with the US army, the panicky response from the US government - and the parallels between computer viruses and mental viruses - i.e. memes.]]> 2022-12-19T21:40:03+00:00 https://www.cybereason.com/blog/malicious-life-podcast-fred-cohen-the-godfather-of-computer-viruses-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8292879 False None None 2.0000000000000000 CybeReason - Vendor blog Royal Rumble: Analysis of Royal Ransomware Royal Rumble: Analysis of Royal Ransomware The Royal ransomware group emerged in early 2022 and has gained momentum since the middle of the year. Its ransomware, which the group deploys through different TTPs, has impacted multiple organizations across the globe. The group itself is suspected of consisting of former members of other ransomware groups, based on similarities researchers have observed between Royal ransomware and other ransomware operators.]]> 2022-12-14T13:40:44+00:00 https://www.cybereason.com/blog/royal-ransomware-analysis www.secnews.physaphae.fr/article.php?IdArticle=8291208 True Ransomware None 3.0000000000000000 CybeReason - Vendor blog Case Study: How Cybereason MDR Improved Olist\'s Triage & Response Time Case Study: How Cybereason MDR Improved Olist's Triage & Response Time Olist, a Brazilian e-commerce marketplace integrator, is one of the fastest-growing eCommerce platforms in the world. Last year, for example, it closed four acquisitions and tripled in size. Today, it is rapidly expanding beyond Brazil.]]> 2022-12-13T19:44:39+00:00 https://www.cybereason.com/blog/how-cybereason-mdr-improved-olists-triage-response-time www.secnews.physaphae.fr/article.php?IdArticle=8290927 False None None 2.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Thamar Reservoir Malicious Life Podcast: Thamar Reservoir Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts by the Iranian regime, trying to take over her email account and lure her away from her country's borders. Her family, friends, and colleagues have also suffered numerous attacks. So, how does it feel to live for years with a virtual target mark on your back?… ]]> 2022-12-13T17:30:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-thamar-reservoir www.secnews.physaphae.fr/article.php?IdArticle=8290762 False None None 2.0000000000000000 CybeReason - Vendor blog Ransomware: Which Industries Are Most Likely to Pay Ransomware: Which Industries Are Most Likely to Pay A recent study by Cybereason, Ransomware: The True Cost to Business 2022, revealed that 73% of respondents had experienced a ransomware attack in the last 24 months. Of those respondents, 28% said their organizations paid the ransom. A separate survey of cybersecurity leaders conducted by WSJ Pro Research found that 42.5% of respondents said they would consider paying a ransom.]]> 2022-12-12T11:00:00+00:00 https://www.cybereason.com/blog/ransomware-which-industries-are-most-likely-to-pay www.secnews.physaphae.fr/article.php?IdArticle=8290246 False Ransomware,Guideline None 4.0000000000000000 CybeReason - Vendor blog What Healthcare CISOs Can Do Differently to Fight Ransomware What Healthcare CISOs Can Do Differently to Fight Ransomware Ransomware attacks cost the healthcare industry over $20 billion in 2020 and show no sign of slowing down. “The current outlook is terrible,” says Israel Barak, CISO of Cybereason. “We are seeing the industry experience an extremely sharp increase in both the quantity and level of sophistication of these attacks.”]]> 2022-12-07T12:00:00+00:00 https://www.cybereason.com/blog/ransomware-what-healthcare-cisos-can-do-differently www.secnews.physaphae.fr/article.php?IdArticle=8288641 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] Nobody likes cheaters, especially in video games: we play games to have fun, and nothing hurts the joy of playing a good game more than losing to a cheater. That is why EA is not the only publisher to implement kernel-mode anti-cheat software in their games: League of Legends and Valorant, for example, use similar software. Yet some people warn that installing such kernel-level systems is extremely dangerous. So, what's the problem with kernel-mode anti-cheat software?]]> 2022-12-06T19:48:35+00:00 https://www.cybereason.com/blog/the-problem-with-kernel-mode-anti-cheat-software-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8288365 False None None 3.0000000000000000 CybeReason - Vendor blog Threat Analysis: MSI - Masquerading as a Software Installer Threat Analysis: MSI - Masquerading as a Software Installer ]]> 2022-12-05T06:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-msi-masquerading-as-software-installer www.secnews.physaphae.fr/article.php?IdArticle=8287706 False Threat,Threat None 3.0000000000000000 CybeReason - Vendor blog FBI, CISA Issue Warning on Cuba Ransomware FBI, CISA Issue Warning on Cuba Ransomware ]]> 2022-12-02T13:00:00+00:00 https://www.cybereason.com/blog/fbi-cisa-warning-on-cuba-ransomware www.secnews.physaphae.fr/article.php?IdArticle=8286625 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Nine Cybersecurity Predictions for 2023 Nine Cybersecurity Predictions for 2023 In 2022, ransomware continued to reign king and became one of the most common and dangerous threats facing healthcare organizations and software supply chains. The war on Ukraine created heightened concern over zero-day threats wreaking havoc for organizations worldwide. The cyber gang Conti with Russian-linked ties managed to disrupt financial operations throughout Costa Rica, and it seems there is no end in sight to the hacking group Lapsus$, which has proven itself to be a formidable threat actor. ]]> 2022-12-01T11:00:00+00:00 https://www.cybereason.com/blog/nine-cybersecurity-predictions-for-2023 www.secnews.physaphae.fr/article.php?IdArticle=8286221 False Ransomware,Threat None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: How to NOT Build a Cybersecurity Startup malicious life podcast norse corp cybersecurity startup When it was founded in 2011, Norse Corp.-which described itself as "the world's largest dedicated threat intelligence network"-had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millions of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?]]> 2022-11-29T16:09:58+00:00 https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup www.secnews.physaphae.fr/article.php?IdArticle=8282772 False Threat None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Jailbreaking Tractors Malicious Life podcast Jailbreaking tractors John Deere, an American agricultural machinery manufacturer, has recently enraged many farmers and digital rights activists due to the restrictive fixing policy of its tractors. Now, an Australian white hat hacker named Sick Codes has demonstrated not only how he was able to jailbreak the company's tractors and run Doom on them (because why not) - but also hack into its global operations center, demonstrating how hackers can easily take over a huge number of farming machines all over the world.]]> 2022-11-28T14:37:31+00:00 https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors www.secnews.physaphae.fr/article.php?IdArticle=8271825 False Hack None 3.0000000000000000 CybeReason - Vendor blog The Russian Business Network The Russian Business Network In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a 'bullet-proof' hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government's years-old tradition of collaborating with organized crime, it's no wonder that the Russian Business Network quickly became Putin's informal cyber attack arm. ]]> 2022-11-25T13:00:00+00:00 https://www.cybereason.com/blog/the-russian-business-network www.secnews.physaphae.fr/article.php?IdArticle=8218368 False None None 3.0000000000000000 CybeReason - Vendor blog What Can Chess Grandmasters Teach Us About Cyber What Can Chess Grandmasters Teach Us About Cyber ]]> 2022-11-24T13:00:00+00:00 https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber www.secnews.physaphae.fr/article.php?IdArticle=8199318 False None None 4.0000000000000000 CybeReason - Vendor blog THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies The Cybereason Global SOC (GSOC) team is investigating Qakbot infections observed in customer environments related to a potentially widespread ransomware campaign run by Black Basta. The campaign is primarily targeting U.S.-based companies. ]]> 2022-11-23T05:01:00+00:00 https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies www.secnews.physaphae.fr/article.php?IdArticle=8173270 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: What Would Happen If CBS Got Hacked? Malicious Life Podcast: What Would Happen If CBS Got Hacked? Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media companies are more public facing by their very nature. How can these organizations be hacked, and why should we care about such attacks? Nate Nelson spoke with Joel Molinoff, former chief information risk officer for CBS Corporation, and Dan Vasile, former vice president of information security at Paramount. ]]> 2022-11-22T11:00:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked www.secnews.physaphae.fr/article.php?IdArticle=8159304 False None None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: LabMD vs. The FTC Malicious Life Podcast LabMD vs FTC One day in 2008, Michael Daugherty - CEO and owner of LabMD, a cancer detection lab - got a call from an executive of TiVera, a cybersecurity company. The caller said that a file containing private medical data of some 9000 of LabMD's patients has been discovered online. When Michael refused to pay for TiVersa's hefty "consultation fee", it reported the incident to the FTC. This was the beginning of a ten-year-long legal battle that ultimately destroyed LabMD - but cost the Federal Agency dearly.]]> 2022-11-18T17:00:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc www.secnews.physaphae.fr/article.php?IdArticle=8091473 False None None None CybeReason - Vendor blog Holiday, Weekend Ransomware Attacks Continue to Hit Companies Hard impact of holiday weekend ransomware attacks As the holidays approach, security leaders wanting to give their teams some much deserved extra time off may get caught in a bind. After all, ransomware actors love to wreak havoc when organizations' human defenses are trying to sleep in heavenly peace. ]]> 2022-11-16T11:00:00+00:00 https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard www.secnews.physaphae.fr/article.php?IdArticle=8045378 False Ransomware,Guideline None None CybeReason - Vendor blog NGAV Redefined: 9 Layers of Unparalleled Attack Protection NGAV Redefined: 9 Layers of Unparalleled Attack Protection Introduction ]]> 2022-11-14T15:50:49+00:00 https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection www.secnews.physaphae.fr/article.php?IdArticle=8010918 False None None 3.0000000000000000 CybeReason - Vendor blog A Message to All Defenders This Veterans Day Veterans Day Message to All Cybersecurity and National Security Defenders I'm Dan Verton, Director of Content Marketing at Cybereason and a proud veteran of the United States Marine Corps. On behalf of my U.S.-based colleagues at Cybereason, I want to extend our sincere gratitude and appreciation to all who have answered our nation's call to service. ]]> 2022-11-11T13:00:00+00:00 https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day www.secnews.physaphae.fr/article.php?IdArticle=7948542 False None None None CybeReason - Vendor blog Machine Timeline Enhancements Improve Investigation Workflows Machine Timeline Enhancements Improve Investigation Workflows In July, Cybereason announced the release of the Process Timeline feature, now known as Machine Timeline, since it shows a unified timeline of events on a machine of interest around the time of a key or “lead event.” Today, Cybereason is excited to announce a series of enhancements in the Machine Timeline feature to improve investigation workflows further.]]> 2022-11-01T20:06:53+00:00 https://www.cybereason.com/blog/machine-timeline-enhancements-improve-investigation-workflows www.secnews.physaphae.fr/article.php?IdArticle=7769271 False Guideline None None CybeReason - Vendor blog Cybereason Announces Organizational Updates Cybereason Announces Organizational Updates ]]> 2022-10-26T21:02:07+00:00 https://www.cybereason.com/blog/cybereason-announces-organizational-updates www.secnews.physaphae.fr/article.php?IdArticle=7691337 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: DLL Side-Loading Widely (Ab)Used THREAT ANALYSIS REPORT: DLL Side-Loading Widely (Ab)Used This Threat Analysis Report is part of the Purple Team Series. In this series, the Managed Detection and Response (MDR) and Threat Intelligence teams from the Cybereason Global Security Operations Center (GSOC) explore widely used attack techniques, outline how threat actors leverage these techniques, describe how to reproduce an attack, and report how defenders can detect and prevent these attacks.]]> 2022-10-21T12:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-dll-side-loading-widely-abused www.secnews.physaphae.fr/article.php?IdArticle=7604633 False Threat None None CybeReason - Vendor blog Operationalizing MITRE ATT&CK: A New Wave is Here Operationalizing MITRE ATT&CK: A New Wave is Here If you want to build and maintain a heatmap of your organization's detection coverage, it requires a mixture of art, science, and actionable transparency from your security vendors. Today, the MITRE ATT&CK Framework has become the de-facto language for how we communicate, analyze, and attribute adversary activity. ]]> 2022-10-19T12:00:00+00:00 https://www.cybereason.com/blog/operationalize-mitre-attack-new-tidal-cyber-wave www.secnews.physaphae.fr/article.php?IdArticle=7560419 False None None None CybeReason - Vendor blog Malicious Life Podcast: Hacking Stock Markets Part 2 Malicious Life Podcast: Hacking Stock Markets Part 2 ]]> 2022-10-18T18:47:44+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacking-stock-markets-part-2 www.secnews.physaphae.fr/article.php?IdArticle=7545211 False None None None CybeReason - Vendor blog Telcos: The Supply Chain Attack You\'re Not Ready For Telcos: The Supply Chain Attack You're Not Ready For ]]> 2022-10-18T15:53:02+00:00 https://www.cybereason.com/blog/telcos-the-supply-chain-attack-youre-not-ready-for www.secnews.physaphae.fr/article.php?IdArticle=7543501 False None None None CybeReason - Vendor blog Indicators of Behavior and the Diminishing Value of IOCs Indicators of Behavior and the Diminishing Value of IOCs ]]> 2022-10-12T14:30:05+00:00 https://www.cybereason.com/blog/indicators-of-behavior-and-the-diminishing-value-of-iocs www.secnews.physaphae.fr/article.php?IdArticle=7415880 False None None None CybeReason - Vendor blog Why NGAV Displaced Traditional Antivirus Tools Why NGAV Displaced Traditional Antivirus Tools Next-generation antivirus (NGAV) solutions are quickly replacing outmoded signature-based antivirus tools, and ransomware has a lot to do with it. Traditional AV tools fall short considering what we're up against when we look at the true cost of ransomware attacks for business, and why this change was inevitable.]]> 2022-10-11T13:51:43+00:00 https://www.cybereason.com/blog/why-ngav-displaced-traditional-antivirus-tools www.secnews.physaphae.fr/article.php?IdArticle=7393320 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Vishing Voice Scams Malicious Life Podcast: Vishing Voice Scams ]]> 2022-10-11T13:13:14+00:00 https://www.cybereason.com/blog/malicious-life-podcast-vishing-voice-scams www.secnews.physaphae.fr/article.php?IdArticle=7393321 False None None None CybeReason - Vendor blog Cybersecurity Accountability Regulation? Your Opinion Matters… Cybersecurity Accountability Regulation? Your Opinion Matters… Harvard Business Review (HBR) recently published an article that tackles the same topic as the latest Cyber Defenders Council report: cybersecurity regulation. The HBR article explores the complexities of incident reporting regulation, while the Cyber Defenders Council report delves into the pros and cons of cybersecurity accountability regulation.]]> 2022-10-06T14:21:59+00:00 https://www.cybereason.com/blog/cybersecurity-accountability-regulation-your-opinion-matters- www.secnews.physaphae.fr/article.php?IdArticle=7320225 False None None None CybeReason - Vendor blog Ten Ways to Make Your Security Operations More Efficient Ten Ways to Make Your Security Operations More Efficient ]]> 2022-10-06T14:11:03+00:00 https://www.cybereason.com/blog/10-ways-to-make-your-security-operations-more-efficient www.secnews.physaphae.fr/article.php?IdArticle=7320226 False None None None CybeReason - Vendor blog Container Escape: All You Need is Cap (Capabilities) Container Escape: All You Need is Cap (Capabilities) ]]> 2022-10-05T14:27:36+00:00 https://www.cybereason.com/blog/container-escape-all-you-need-is-cap-capabilities www.secnews.physaphae.fr/article.php?IdArticle=7308741 False None None None CybeReason - Vendor blog Leveraging Indicators of Behavior for Early Detection Leveraging Indicators of Behavior for Early Detection ]]> 2022-10-05T14:18:33+00:00 https://www.cybereason.com/blog/leveraging-indicators-of-behavior-for-early-detection www.secnews.physaphae.fr/article.php?IdArticle=7307702 False None None None CybeReason - Vendor blog Blue Teaming on macOS with eslogger Blue Teaming on macOS with eslogger ]]> 2022-10-04T14:57:39+00:00 https://www.cybereason.com/blog/blue-teaming-on-macos-with-eslogger www.secnews.physaphae.fr/article.php?IdArticle=7297123 False None None None