www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T16:42:06+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog L'épidémie silencieuse: découvrir les dangers de la fatigue alerte et comment le surmonter<br>The Silent Epidemic: Uncovering the Dangers of Alert Fatigue and How to Overcome It  L'épidémie silencieuse: découvrir les dangers de la fatigue alerte et comment le surmonter À l'ère numérique d'aujourd'hui, les cyberattaques sont devenues une menace commune et constante pour les individus et les organisations.Des escroqueries à phishing aux attaques de logiciels malveillants, les cybercriminels trouvent constamment de nouvelles façons d'exploiter les vulnérabilités et de voler des informations sensibles.Les ransomwares sont de plus en plus répandus, avec des attaques de haut niveau ciblant les grandes organisations, les agences gouvernementales et les systèmes de santé.Les conséquences d'une attaque de ransomware peuvent être dévastatrices, entraînant une perte financière, des dommages de réputation et même le compromis de données sensibles.
The Silent Epidemic: Uncovering the Dangers of Alert Fatigue and How to Overcome It In today\'s digital age, cyberattacks have become a common and constant threat to individuals and organizations alike. From phishing scams to malware attacks, cybercriminals are constantly finding new ways to exploit vulnerabilities and steal sensitive information. Ransomware is increasingly prevalent, with high-profile attacks targeting large organizations, government agencies, and healthcare systems. The consequences of a ransomware attack can be devastating, resulting in financial loss, reputational damage, and even the compromise of sensitive data.]]>
2024-10-03T13:00:00+00:00 https://www.cybereason.com/blog/the-silent-epidemic-uncovering-the-dangers-of-alert-fatigue-and-how-to-overcome-it www.secnews.physaphae.fr/article.php?IdArticle=8591265 False Ransomware,Malware,Vulnerability,Threat,Medical None 2.0000000000000000
CybeReason - Vendor blog Podcast MALICICE Life: Pourquoi les gens ont-ils écrit des virus dans les années 80 et 90?<br>Malicious Life Podcast: Why Did People Write Viruses In The 80s & 90s? ]]> 2024-07-15T19:33:45+00:00 https://www.cybereason.com/blog/malicious-life-podcast-why-did-people-write-viruses-in-the-80s-and-90s www.secnews.physaphae.fr/article.php?IdArticle=8540520 False Malware None 2.0000000000000000 CybeReason - Vendor blog De Cracked à piraté: les logiciels malveillants se propagent via des vidéos YouTube<br>From Cracked to Hacked: Malware Spread via YouTube Videos YouTube Malware Vector Ce rapport d'analyse des menaces se plongera dans les comptes YouTube compromis utilisés comme vecteur pour la propagation des logiciels malveillants.Il décrira comment ce vecteur d'attaque est exploité pour les campagnes à faible combustion et à faible coût, mettant en évidence les stratégies utilisées par les acteurs de la menace et comment les défenseurs peuvent détecter et prévenir ces attaques. & NBSP;
youtube malware vector This Threat Analysis Report will delve into compromised YouTube accounts being used as a vector for the spread of malware. It will outline how this attack vector is exploited for low-burn, low-cost campaigns, highlighting strategies used by threat actors and how defenders can detect and prevent these attacks. ]]>
2024-02-12T16:37:24+00:00 https://www.cybereason.com/blog/from-cracked-to-hacked-malware-spread-via-youtube-videos www.secnews.physaphae.fr/article.php?IdArticle=8449326 False Malware,Threat None 3.0000000000000000
CybeReason - Vendor blog Ransomware Attacks by the Numbers - and How to Defend Against Them Ransomware Attacks by the Numbers - and How to Defend Against Them Ransomware is an ever-evolving type of malware that has been around for more than two decades. First appearing in the late 1980s and growing in popularity and complexity in the early 2010s, Ransomware has risen to an unprecedented level with multi-million dollar ransom demands in attacks against companies like Colonial Pipeline, JBS Foods and other critical infrastructure providers. ]]> 2022-07-20T13:49:40+00:00 https://www.cybereason.com/blog/ransomware-attacks-by-the-numbers-and-how-to-defend-against-them www.secnews.physaphae.fr/article.php?IdArticle=5833467 False Ransomware,Malware None None CybeReason - Vendor blog Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Cybersecurity often focuses on malware campaigns or the latest zero-day exploit. Surveys and reports reveal the average cost of a data breach or how much it typically costs to recover from a ransomware attack. Those are the attacks that make noise and capture attention, though. The attacks that fly under the radar are often more insidious and much more costly. ]]> 2022-05-04T04:02:00+00:00 https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation www.secnews.physaphae.fr/article.php?IdArticle=4541154 False Ransomware,Data Breach,Malware None None CybeReason - Vendor blog Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive In part one of this research, the Cybereason Nocturnus Incident Response Team provided a unique glimpse into the Wintti intrusion playbook, covering the techniques that were used by the group from initial compromise to stealing the data, as observed and analyzed by the Cybereason Incident Response team. ]]> 2022-05-04T04:00:00+00:00 https://www.cybereason.com/blog/operation-cuckoobees-a-winnti-malware-arsenal-deep-dive www.secnews.physaphae.fr/article.php?IdArticle=4541156 False Malware APT 41 None CybeReason - Vendor blog THREAT ANALYSIS REPORT: Snake Infostealer Malware THREAT ANALYSIS REPORT: Snake Infostealer Malware The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]> 2021-10-28T13:00:12+00:00 https://www.cybereason.com/blog/threat-analysis-report-snake-infostealer-malware www.secnews.physaphae.fr/article.php?IdArticle=3576713 True Malware,Threat None None CybeReason - Vendor blog Microsoft OneDrive Used for Ransom Operations Microsoft OneDrive Used for Ransom Operations Microsoft was called out recently after it was discovered that hundreds of malware files commonly used to launch Conti ransomware attacks are being hosted from their OneDrive cloud storage service. The news highlights once again that Microsoft needs to invest significant time and resources just to get its own security house in order-and why they have no business trying to sell customers cybersecurity solutions to problems they created. ]]> 2021-10-22T19:31:06+00:00 https://www.cybereason.com/blog/microsoft-onedrive-used-for-ransom-operations www.secnews.physaphae.fr/article.php?IdArticle=3550865 False Ransomware,Malware None None CybeReason - Vendor blog Cybereason vs. Avaddon Ransomware Cybereason vs. Avaddon Ransomware Over the last few months, the Cybereason Nocturnus Team has been tracking the activity of the Avaddon Ransomware. It has been active since June 2020 and is operating with the Ransomware-as-a-Service (RaaS) and double extortion models, targeting sectors such as healthcare. Avaddon is distributed via malspam campaigns, where the victim is being lured to download the malware loader.]]> 2021-04-27T14:52:51+00:00 https://www.cybereason.com/blog/cybereason-vs.-avaddon-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2703416 False Ransomware,Malware None None CybeReason - Vendor blog HAFNIUM Exploits Live On HAFNIUM Exploits Live On The Prometei Botnet is not new. Like most malware and exploits, it continues to adapt and change over time. What is concerning is what is happening now. Our latest research demonstrates  how Prometei has evolved and reveals that current versions of Prometei are now exploiting some of the vulnerabilities in Microsoft Exchange that were part of the recent HAFNIUM attacks. We will continue to deal with lingering effects from these specific Microsoft Exchange vulnerabilities, but-more importantly-we will continue to deal with vulnerabilities in general and that requires a better approach to cybersecurity.]]> 2021-04-22T19:27:46+00:00 https://www.cybereason.com/blog/hafnium-exploits-live-on www.secnews.physaphae.fr/article.php?IdArticle=2680024 False Malware None None CybeReason - Vendor blog Ransomware Decoded: Preventing Modern Ransomware Attacks Ransomware Decoded: Preventing Modern Ransomware Attacks Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing immediate damage.]]> 2021-04-19T13:25:54+00:00 https://www.cybereason.com/blog/preventing-modern-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=2666029 False Ransomware,Malware None None CybeReason - Vendor blog Five Clear Steps to Enhance SecOps with MITRE ATT@CK Five Clear Steps to Enhance SecOps with MITRE ATT@CK A skyrocketing number of alerts, limited security talent, and millions of new malware strains daily have made security a seemingly insurmountable task. ]]> 2021-04-12T02:50:19+00:00 https://www.cybereason.com/blog/steps-to-enhance-secops-with-mitre-attck www.secnews.physaphae.fr/article.php?IdArticle=2622804 False Malware None None CybeReason - Vendor blog Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware Over the past year, the Cybereason Nocturnus Team has observed various trends among cyber criminals and nation-state groups leveraging various global events such as COVID-19 and other topical themes and trending issues as phishing content to lure their victims into installing their malware of choice.]]> 2021-03-18T10:04:34+00:00 https://www.cybereason.com/blog/cybereason-exposes-malware-targeting-us-taxpayers www.secnews.physaphae.fr/article.php?IdArticle=2499265 False Malware None None CybeReason - Vendor blog Molerats APT: New Malware and Techniques in Middle East Espionage Campaign Molerats APT: New Malware and Techniques in Middle East Espionage Campaign Security researchers observed a politically motivated APT called “Molerats” using three new malware variants to conduct espionage in the Middle East.]]> 2020-12-15T18:11:05+00:00 https://www.cybereason.com/blog/molerats-apt-new-malware-and-techniques-in-middle-east-espionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=2103065 False Malware None None CybeReason - Vendor blog New Malware Arsenal Abusing Cloud Platforms in Middle East Espionage Campaign New Malware Arsenal Abusing Cloud Platforms in Middle East Espionage Campaign The Cybereason Nocturnus Team has identified an active espionage campaign employing three previously unidentified malware variants that use Facebook, Dropbox, Google Docs and Simplenote for command & control and the exfiltration of data from targets across the Middle East. The full report can be downloaded here (ungated).]]> 2020-12-09T02:00:00+00:00 https://www.cybereason.com/blog/new-malware-arsenal-abusing-cloud-platforms-in-middle-east-espionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=2086087 False Malware None None CybeReason - Vendor blog Novel Chaes Malware Underscores Heightened E-Commerce Risk This Holiday Season Novel Chaes Malware Underscores Heightened E-Commerce Risk This Holiday Season The Cybereason Nocturnus Team has identified an active campaign targeting customers of a larger e-commerce platform with newly identified multi-stage malware that evades antivirus tools dubbed Chaes. ]]> 2020-11-18T04:15:00+00:00 https://www.cybereason.com/blog/novel-chaes-malware-underscores-heightened-e-commerce-risk-this-holiday-season www.secnews.physaphae.fr/article.php?IdArticle=2041387 False Malware None None CybeReason - Vendor blog Law Enforcement Warns of Imminent Ransomware Threat to U.S. Hospitals Law Enforcement Warns of Imminent Ransomware Threat to U.S. Hospitals On October 29, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) published a joint alert with the Federal Bureau of Investigations (FBI) and the Department of Health and Human Services (HHS). In it, the organizations claimed to “have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” CISA, the FBI and HHS attributed the threat to the digital criminal enterprise behind TrickBot, malware which is capable of targeting victims with ransomware.]]> 2020-10-30T19:55:19+00:00 https://www.cybereason.com/blog/law-enforcement-warns-of-imminent-ransomware-threat-to-u.s.-hospitals www.secnews.physaphae.fr/article.php?IdArticle=2005115 False Ransomware,Malware,Threat None None CybeReason - Vendor blog Next-generation Antivirus 101: Layers of Prevention Next-generation Antivirus 101: Layers of Prevention The foundation of the antivirus industry was built in the 1980s, with companies like McAfee and Avast releasing their first antivirus products. At that time, the terms “malware” and “computer virus” were just being born. Over the course of the next forty years, attackers would develop malware into the broad mix of crude and sophisticated software we see today. Now, there are over 1000M new malware samples classified every year.]]> 2020-06-23T17:06:55+00:00 https://www.cybereason.com/blog/next-generation-antivirus-101-layers-of-prevention www.secnews.physaphae.fr/article.php?IdArticle=1798827 False Malware None None