www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-09T18:53:37+00:00 www.secnews.physaphae.fr Security Intelligence - Site de news Américain Les chercheurs développent des AI \\ 'vers \\' ciblant les systèmes Génératifs AI<br>Researchers develop malicious AI \\'worm\\' targeting generative AI systems Les chercheurs ont créé un nouveau type de logiciel malveillant, jamais vu auparavant, ils appellent le & # 8220; Morris II & # 8221;Worm, qui utilise des services d'IA populaires pour se propager, infecter de nouveaux systèmes et voler des données. & # 160; Le nom fait référence au ver d'ordinateur Morris qui a fait des ravages sur Internet en 1988. Le ver démontre les dangers potentiels des menaces de sécurité de l'IA et[& # 8230;]
>Researchers have created a new, never-seen-before kind of malware they call the “Morris II” worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and […] ]]>
2024-04-24T13:00:00+00:00 https://securityintelligence.com/articles/malicious-ai-worm-targeting-generative-ai/ www.secnews.physaphae.fr/article.php?IdArticle=8488002 False Malware None 3.0000000000000000
Security Intelligence - Site de news Américain Nouveau faux logiciel malveillant cible les banques latino-américaines<br>New Fakext malware targets Latin American banks Cet article a été rendu possible grâce aux contributions d'Itzhak Chimino, Michael Gal et Liran Tiebloom.Les extensions du navigateur sont devenues intégrales à notre expérience en ligne.Des outils de productivité aux modules complémentaires de divertissement, ces petits modules logiciels offrent des fonctionnalités personnalisées en fonction des préférences individuelles.Malheureusement, les extensions peuvent également s'avérer utiles aux acteurs malveillants.Capitaliser sur le [& # 8230;]
>This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the […] ]]>
2024-03-07T11:00:00+00:00 https://securityintelligence.com/posts/fakext-targeting-latin-american-banks/ www.secnews.physaphae.fr/article.php?IdArticle=8465189 False Malware,Tool None 3.0000000000000000
Security Intelligence - Site de news Américain Ermac Malware: l'autre côté du code<br>Ermac malware: The other side of the code Lorsque le code de Cerberus a été divulgué fin 2020, les chercheurs de fiduciaires IBM ont prévu qu'une nouvelle mutation de Cerberus n'était qu'une question de temps.Plusieurs acteurs ont utilisé le code Cerberus divulgué mais sans modifications significatives du malware.Cependant, le malwarehunterteam a découvert une nouvelle variante de Cerberus & # 8212;connu sous le nom d'ERMAC (également connu sous le nom de crochet) [& # 8230;]
>When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) […] ]]>
2024-01-29T14:00:00+00:00 https://securityintelligence.com/posts/ermac-malware-the-other-side-of-the-code/ www.secnews.physaphae.fr/article.php?IdArticle=8444444 False Malware None 3.0000000000000000
Security Intelligence - Site de news Américain Pixpirate: le malware financier brésilien que vous ne pouvez pas voir<br>PixPirate: The Brazilian financial malware you can\\'t see Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a […] ]]> 2024-01-28T10:40:50+00:00 https://securityintelligence.com/posts/pixpirate-brazilian-financial-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8444061 False Malware None 3.0000000000000000 Security Intelligence - Site de news Américain Les injections sur le Web sont de retour en augmentation: 40+ banques affectées par une nouvelle campagne de logiciels malveillants<br>Web injections are back on the rise: 40+ banks affected by new malware campaign Les injections Web, une technique privilégiée utilisée par divers chevaux de Troie bancaire, ont été une menace persistante dans le domaine des cyberattaques.Ces injections malveillantes permettent aux cybercriminels de manipuler les échanges de données entre les utilisateurs et les navigateurs Web, compromettant potentiellement des informations sensibles.En mars 2023, des chercheurs en sécurité chez IBM Security Trudieer ont découvert une nouvelle campagne de logiciels malveillants en utilisant JavaScript [& # 8230;]
>Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript […] ]]>
2023-12-19T14:00:00+00:00 https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8425489 False Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain L'évolution de 20 ans de conscience de la cybersécurité<br>The evolution of 20 years of cybersecurity awareness Depuis 2004, la Maison Blanche et le Congrès ont désigné le Mois national de sensibilisation à la cybersécurité d'octobre.Cette année marque le 20e anniversaire de cet effort pour sensibiliser à l'importance de la cybersécurité et de la sécurité en ligne.Comment la cybersécurité et les logiciels malveillants ont-ils évolué au cours des deux dernières décennies?Quels types d'outils de gestion des menaces ont fait surface et quand?Le [& # 8230;]
>Since 2004, the White House and Congress have designated October National Cybersecurity Awareness Month. This year marks the 20th anniversary of this effort to raise awareness about the importance of cybersecurity and online safety. How have cybersecurity and malware evolved over the last two decades? What types of threat management tools surfaced and when? The […] ]]>
2023-10-27T13:00:00+00:00 https://securityintelligence.com/articles/20-years-of-cybersecurity-awareness/ www.secnews.physaphae.fr/article.php?IdArticle=8401440 False Malware,Tool,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Les campagnes par e-mail tirent parti de dbatloader mis à jour pour livrer des rats, des voléeurs<br>Email campaigns leverage updated DBatLoader to deliver RATs, stealers IBM X-FORCE a identifié de nouvelles capacités dans les échantillons de logiciels malveillants DBATloader livrés dans des campagnes de courrier électronique récentes, signalant un risque accru d'infection des familles de logiciels malveillants des produits associés à l'activité DBATloader.Explorez l'analyse.
>IBM X-Force has identified new capabilities in DBatLoader malware samples delivered in recent email campaigns, signaling a heightened risk of infection from commodity malware families associated with DBatLoader activity. Explore the analysis. ]]>
2023-09-12T16:00:00+00:00 https://securityintelligence.com/posts/email-campaigns-leverage-updated-dbatloader-deliver-rats-stealers/ www.secnews.physaphae.fr/article.php?IdArticle=8387693 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain Gozi frappe à nouveau, ciblant les banques, la crypto-monnaie et plus<br>Gozi strikes again, targeting banks, cryptocurrency and more Dans le monde de la cybercriminalité, les logiciels malveillants jouent un rôle de premier plan.Un de ces logiciels malveillants, Gozi, a émergé en 2006 sous le nom de Gozi CRM, également connu sous le nom de CRM ou Papras.Initialement offerte comme plate-forme de crime en tant que service (CAAS) appelé 76Service, Gozi a rapidement acquis une notoriété pour ses capacités avancées.Au fil du temps, Gozi a subi une transformation significative et s'est associé à d'autres [& # 8230;]
>In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other […] ]]>
2023-08-17T10:00:00+00:00 https://securityintelligence.com/posts/gozi-strikes-again-targeting-banks-cryptocurrency-and-more/ www.secnews.physaphae.fr/article.php?IdArticle=8371214 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain Amener les informations sur les menaces et les idées adverses au premier plan: Hub de recherche X-Force<br>Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub Aujourd'hui, les défenseurs traitent à la fois un paysage de menace qui change constamment et les attaques constamment qui ont résisté à l'épreuve du temps.L'innovation et les meilleures pratiques coexistent dans le monde criminel, et l'une ne nous distrait de l'autre.IBM X-Force observe continuellement de nouveaux vecteurs d'attaque et de nouveaux logiciels malveillants dans la nature, alors que les adversaires recherchent [& # 8230;]
>Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. Innovation and best practices co-exist in the criminal world, and one mustn’t distract us from the other. IBM X-Force is continuously observing new attack vectors and novel malware in the wild, as adversaries seek […] ]]>
2023-08-03T18:00:00+00:00 https://securityintelligence.com/threat-intelligence-adversary-insights-forefront-x-force-research-hub/ www.secnews.physaphae.fr/article.php?IdArticle=8365385 False Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Bringing threat intelligence and adversary insights to the forefront: X-Force Research Hub Aujourd'hui, les défenseurs traitent à la fois un paysage de menace qui change constamment et les attaques constamment qui ont résisté à l'épreuve du temps.L'innovation et les meilleures pratiques coexistent dans le monde criminel, et l'une ne nous distrait de l'autre.IBM X-Force observe continuellement de nouveaux vecteurs d'attaque et de nouveaux logiciels malveillants dans la nature, alors que les adversaires recherchent [& # 8230;]
>Today defenders are dealing with both a threat landscape that’s constantly changing and attacks that have stood the test of time. Innovation and best practices co-exist in the criminal world, and one mustn’t distract us from the other. IBM X-Force is continuously observing new attack vectors and novel malware in the wild, as adversaries seek […] ]]>
2023-08-03T18:00:00+00:00 https://securityintelligence.com/posts/threat-intelligence-adversary-insights-forefront-x-force-research-hub/ www.secnews.physaphae.fr/article.php?IdArticle=8366208 False Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Blockyquasar: X-Force HIVE0129 ciblant les intuitions financières à Latam avec un cheval de Troie bancaire personnalisé<br>BlotchyQuasar: X-Force Hive0129 targeting financial intuitions in LATAM with a custom banking trojan Fin avril à mai 2023, IBM Security X-Force a trouvé plusieurs e-mails de phishing menant à des fichiers exécutables emballés offrant des logiciels malveillants que nous avons nommés Blockyquasar, probablement développés par un groupe X-Force Tracks sous le nom de HIVE0129.Blockyquasar est codé en dur pour collecter des informations d'identification de plusieurs applications bancaires en Amérique latine et sites Web utilisés dans des environnements publics et privés.Opérations similaires [& # 8230;]
>In late April through May 2023, IBM Security X-Force found several phishing emails leading to packed executable files delivering malware we have named BlotchyQuasar, likely developed by a group X-Force tracks as Hive0129. BlotchyQuasar is hardcoded to collect credentials from multiple Latin American-based banking applications and websites used within public and private environments. Similar operations […] ]]>
2023-07-14T13:45:00+00:00 https://securityintelligence.com/posts/x-force-hive0129-targeting-financial-institutions-latam-banking-trojan/ www.secnews.physaphae.fr/article.php?IdArticle=8356564 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain Ransomware Renaissance 2023: The Definitive Guide to Stay Safer Le ransomware connaît une Renaissance en 2023, certaines sociétés de cybersécurité signalant plus de 400 attaques au mois de mars.Et cela ne devrait pas être une surprise: l'indice de renseignement sur les menaces X 2023 a trouvé des déploiements de porte dérobée & # 8212;MALWORED offrant un accès à distance & # 8212;comme l'action supérieure de l'attaquant en 2022, et prédit bien les échecs de porte dérobée de 2022 [& # 8230;]
>Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures […] ]]>
2023-06-01T10:00:00+00:00 https://securityintelligence.com/posts/ransomware-renaissance-definitive-guide-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8341214 False Ransomware,Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Ransomware Renaissance 2023: Le guide définitif pour rester en sécurité<br>Ransomware Renaissance 2023: The Definitive Guide to Stay Safer Le ransomware connaît une Renaissance en 2023, certaines sociétés de cybersécurité signalant plus de 400 attaques au mois de mars.Et cela ne devrait pas être une surprise: l'indice de renseignement sur les menaces X 2023 a trouvé des déploiements de porte dérobée & # 8212;MALWORED offrant un accès à distance & # 8212;comme l'action supérieure de l'attaquant en 2022, et prédit bien les échecs de porte dérobée de 2022 [& # 8230;]
>Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures […] ]]>
2023-06-01T10:00:00+00:00 https://securityintelligence.com/ransomware-renaissance-definitive-guide-2023/ www.secnews.physaphae.fr/article.php?IdArticle=8341167 False Ransomware,Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Comment le voleur d'informations Zeus Trojan a changé de cybersécurité<br>How the ZeuS Trojan Info Stealer Changed Cybersecurity Les logiciels malveillants du voleur d'informations sont un type de logiciel malveillant conçu pour collecter des informations sensibles auprès d'un ordinateur de victime.Également connue sous le nom de voleurs d'informations, de voleurs de données ou de logiciels malveillants de vol de données, ce logiciel est vrai à son nom: après avoir infecté un ordinateur ou un appareil, il est très apte à exfiltrant des informations d'identification de connexion, des informations financières et des données personnelles.Info Stealers [& # 8230;]
>Information stealer malware is a type of malicious software designed to collect sensitive information from a victim’s computer. Also known as info stealers, data stealers or data-stealing malware, this software is true to its name: after infecting a computer or device, it’s highly adept at exfiltrating login credentials, financial information and personal data. Info stealers […] ]]>
2023-05-08T13:00:00+00:00 https://securityintelligence.com/articles/how-the-zeus-trojan-info-stealer-changed-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8334258 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain Les acteurs ex-Conti et Fin7 collaborent avec la nouvelle porte dérobée Domino<br>Ex-Conti and FIN7 Actors Collaborate with New Domino Backdoor Ce blog a été rendu possible grâce à des contributions de Christopher Caridi. & # 160;IBM Security X-Force a récemment découvert une nouvelle famille de logiciels malveillants que nous avons appelée & # 8220; Domino, & # 8221;que nous évaluons a été créé par les développeurs associés au groupe cybercriminéal que X-Force suit ITG14, également connu sous le nom de FIN7.Anciens membres du syndicat Trickbot / Conti qui suit X-Force comme itg23 [& # 8230;]
>This blog was made possible through contributions from Christopher Caridi.  IBM Security X-Force recently discovered a new malware family we have called “Domino,” which we assess was created by developers associated with the cybercriminal group that X-Force tracks as ITG14, also known as FIN7. Former members of the Trickbot/Conti syndicate which X-Force tracks as ITG23 […] ]]>
2023-04-14T17:30:00+00:00 https://securityintelligence.com/posts/ex-conti-fin7-actors-collaborate-new-domino-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=8327899 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain Méthodes de détection: savez-vous où sont vos informations d'identification?<br>Detection Methods: Do You Know Where Your Credentials are? Les logiciels malveillants de volée de l'information sont devenus extrêmement omniprésents ces dernières années.Ce malware récolte des millions d'identification par an, des dispositifs et entreprises de terminaux à travers le monde aux effets dévastateurs. & # 160;En utilisant des méthodes d'attaque hautement automatisées et orchestrées, les acteurs de la menace et les courtiers d'accès initiaux fournissent une approvisionnement sans fin d'identification compromise aux syndicats de cyber-criminels qui utilisent ces informations d'identification [& # 8230;]
>Information-stealing malware has become extremely pervasive in recent years. This malware harvests millions of credentials annually from endpoint devices and enterprises across the globe to devastating effects.  Using highly automated and orchestrated attack methods, threat actors and initial access brokers provide an endless supply of compromised credentials to cyber criminal syndicates who use those credentials […] ]]>
2023-04-14T13:00:00+00:00 https://securityintelligence.com/posts/detection-methods-do-you-know-where-your-credentials-are/ www.secnews.physaphae.fr/article.php?IdArticle=8327781 False Malware,Threat None 2.0000000000000000
Security Intelligence - Site de news Américain Nouvelles attaques cible les canaux de service à la clientèle en ligne [New Attack Targets Online Customer Service Channels] Un groupe d'attaquant inconnu cible les agents du service client dans les sociétés de jeu et de jeu avec un nouvel effort de logiciel malveillant.Connu sous le nom de IceBreaker, le code est capable de voler des mots de passe et des cookies, d'expulser les fichiers, de prendre des captures d'écran et d'exécuter des scripts VBS personnalisés.Bien que ce soient des fonctions assez standard, ce qui distingue le brise-glace, c'est son vecteur d'infection.Malveillant [& # 8230;]
>An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious […] ]]>
2023-03-24T13:00:00+00:00 https://securityintelligence.com/articles/new-attack-targets-online-customer-service-channels/ www.secnews.physaphae.fr/article.php?IdArticle=8321240 False Malware None 2.0000000000000000
Security Intelligence - Site de news Américain When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule En février 2023, X-Force a publié un blog intitulé & # 8220; Direct Kernel Object Manipulation (DKOM) Attacks contre les fournisseurs ETW & # 8221;Cela détaille les capacités d'un échantillon attribué au groupe Lazare se sont exploités pour altérer la visibilité des opérations de logiciels malveillants.Ce blog ne remaniera pas l'analyse de l'échantillon de logiciel malveillant Lazarus ou du traçage d'événements pour Windows (ETW) comme [& # 8230;]
>In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as […] ]]>
2023-03-20T18:30:00+00:00 https://securityintelligence.com/posts/defensive-considerations-lazarus-fudmodule/ www.secnews.physaphae.fr/article.php?IdArticle=8320005 False Malware,Medical APT 38 3.0000000000000000
Security Intelligence - Site de news Américain Detecting the Undetected: The Risk to Your Info IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories […] ]]> 2023-02-16T18:00:00+00:00 https://securityintelligence.com/detecting-undetected-info-stealers/ www.secnews.physaphae.fr/article.php?IdArticle=8310935 False Malware,Threat None 3.0000000000000000 Security Intelligence - Site de news Américain What are the Duties of a Malware Analyst? Malware breaches begin in many ways. Recently, multiple fake antivirus apps in the Google Play Store were infected with malware. Earlier this year, malware deployed through satellites shut down modems in Ukraine. Destructive malware attacks have an average lifecycle of 324 days (233 days to identify and 91 days to contain), compared to the global […] ]]> 2023-02-16T14:00:00+00:00 https://securityintelligence.com/what-is-a-malware-analyst/ www.secnews.physaphae.fr/article.php?IdArticle=8310840 False Malware None 2.0000000000000000 Security Intelligence - Site de news Américain Six Common Ways That Malware Strains Get Their Names You’re likely familiar with the names of common malware strains such as MOUSEISLAND, Agent Tesla and TrickBot. But do you know how new malware threats get their names? As a cybersecurity writer, I quickly add new strains to my vocabulary. But I never knew how they came to have those names in the first place. […] ]]> 2023-02-10T14:00:00+00:00 https://securityintelligence.com/articles/six-ways-malware-strains-get-names/ www.secnews.physaphae.fr/article.php?IdArticle=8308880 False Malware None 3.0000000000000000 Security Intelligence - Site de news Américain Kronos Malware Reemerges with Increased Functionality The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos […] ]]> 2023-01-25T17:30:00+00:00 https://securityintelligence.com/kronos-malware-reemerges-increased-functionality/ www.secnews.physaphae.fr/article.php?IdArticle=8304012 False Malware None 2.0000000000000000 Security Intelligence - Site de news Américain A View Into Web(View) Attacks in Android James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware […] ]]> 2023-01-11T01:00:00+00:00 https://securityintelligence.com/posts/view-into-webview-attacks-android/ www.secnews.physaphae.fr/article.php?IdArticle=8299852 False Malware None 2.0000000000000000 Security Intelligence - Site de news Américain How Reveton Ransomware-as-a-Service Changed Cybersecurity In 2012, Reveton ransomware emerged. It’s considered to be the first Ransomware-as-a-Service (RaaS) operation ever. Since then, RaaS has enabled gangs with basic technical skills to launch attacks indiscriminately. Now, nearly anyone can create highly effective malware campaigns. We now see RaaS outfits with organizational capabilities that rival the most professional Software-as-a-Service (SaaS) brands. But […] ]]> 2022-12-19T14:00:00+00:00 https://securityintelligence.com/articles/how-reveton-raas-changed-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8292767 False Ransomware,Malware None 3.0000000000000000 Security Intelligence - Site de news Américain Worms of Wisdom: How WannaCry Shapes Cybersecurity Today WannaCry wasn’t a particularly complex or innovative ransomware attack. What made it unique, however, was its rapid spread. Using the EternalBlue exploit, malware could quickly move from device to device, leveraging a flaw in the Microsoft Windows Server Message Block (SMB) protocol.  As a result, when the WannaCry “ransomworm” hit networks in 2017, it expanded […] ]]> 2022-11-28T14:00:00+00:00 https://securityintelligence.com/how-wannacry-shapes-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=8271768 False Ransomware,Malware Wannacry,Wannacry 2.0000000000000000 Security Intelligence - Site de news Américain RansomExx Upgrades to Rust IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this […] ]]> 2022-11-22T17:00:00+00:00 https://securityintelligence.com/posts/ransomexx-upgrades-rust/ www.secnews.physaphae.fr/article.php?IdArticle=8164316 False Ransomware,Malware,Threat None 4.0000000000000000 Security Intelligence - Site de news Américain How the Mac OS X Trojan Flashback Changed Cybersecurity Not so long ago, the Mac was thought to be impervious to viruses. In fact, Apple once stated on its website that “it doesn’t get PC viruses”. But that was before the Mac OS X Trojan Flashback malware appeared in 2012. Since then, Mac and iPhone security issues have changed dramatically — and so has […] ]]> 2022-11-07T17:29:50+00:00 https://securityintelligence.com/articles/how-mac-trojan-flashback-changed-cybersecurity/ www.secnews.physaphae.fr/article.php?IdArticle=7882442 False Malware None None Security Intelligence - Site de news Américain Does Follina Mean It\'s Time to Abandon Microsoft Office? 2022-09-22T13:00:00+00:00 https://securityintelligence.com/articles/follina-vulnerability-abandon-microsoft-office/ www.secnews.physaphae.fr/article.php?IdArticle=7062521 False Malware,Vulnerability None None Security Intelligence - Site de news Américain Raspberry Robin and Dridex: Two Birds of a Feather IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure […] ]]> 2022-09-01T16:20:00+00:00 https://securityintelligence.com/posts/raspberry-robin-worm-dridex-malware/ www.secnews.physaphae.fr/article.php?IdArticle=6667620 False Malware None None Security Intelligence - Site de news Américain From Ramnit To Bumblebee (via NeverQuest): Similarities and Code Overlap Shed Light On Relationships Between Malware Developers A comparative analysis performed by IBM Security X-Force uncovered evidence that suggests Bumblebee malware, which first appeared in the wild last year, was likely developed directly from source code associated with the Ramnit banking trojan. This newly discovered connection is particularly interesting as campaign activity has so far linked Bumblebee to affiliates of the threat […] ]]> 2022-08-18T15:58:00+00:00 https://securityintelligence.com/posts/from-ramnit-to-bumblebee-via-neverquest/ www.secnews.physaphae.fr/article.php?IdArticle=6395949 False Malware,Threat None None Security Intelligence - Site de news Américain What TrickBot tells us about the future of What TrickBot tells us about the future of malware  Malware attackers are increasingly sophisticated. Here’s what to know  On TrickBot and the future of malware    Malware threats have plagued organizations for decades, but that’s no reason to be complacent with a security strategy that has to date protected your organization. Now more than ever, malware is […] ]]> 2022-06-08T01:26:57+00:00 https://securityintelligence.com/posts/what-trickbot-tells-us-about-the-future-of/ www.secnews.physaphae.fr/article.php?IdArticle=5031993 False Malware,Threat None None Security Intelligence - Site de news Américain Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-Force Threat Intelligence Index 2022 digs into attack types, infection vectors, top threat actors, malware trends and industry-specific insights.  This year, a new industry took the infamous top spot: […] ]]> 2022-05-26T13:00:00+00:00 https://securityintelligence.com/articles/lessons-learned-top-cyberattacks-x-force/ www.secnews.physaphae.fr/article.php?IdArticle=4820795 False Malware,Threat None None Security Intelligence - Site de news Américain The Growing Danger of Data Exfiltration by Third-Party Web Scripts 2022-05-06T13:00:00+00:00 https://securityintelligence.com/growing-danger-data-exfiltration-third-party-web-scripts/ www.secnews.physaphae.fr/article.php?IdArticle=4555160 False Malware None 4.0000000000000000 Security Intelligence - Site de news Américain Hive0117 Continues Fileless Malware Delivery in Eastern Europe 2022-04-26T12:00:00+00:00 https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe/ www.secnews.physaphae.fr/article.php?IdArticle=4507929 False Malware None None Security Intelligence - Site de news Américain Solving the Data Problem Within Incident Response 2022-04-25T15:30:00+00:00 https://securityintelligence.com/posts/solving-data-problem-incident-response/ www.secnews.physaphae.fr/article.php?IdArticle=4504662 False Malware None None Security Intelligence - Site de news Américain Where Everything Old is New Again: Operational Technology and Ghost of Malware Past 2022-04-13T10:00:00+00:00 https://securityintelligence.com/posts/operational-technology-ghost-malware-past/ www.secnews.physaphae.fr/article.php?IdArticle=4439658 False Malware None 5.0000000000000000 Security Intelligence - Site de news Américain 2022 Banking & Finance Security Intelligence Roundup 2022-03-31T13:00:00+00:00 https://securityintelligence.com/articles/2022-banking-finance-security-intelligence-roundup/ www.secnews.physaphae.fr/article.php?IdArticle=4372808 False Ransomware,Malware None None Security Intelligence - Site de news Américain CaddyWiper: Third Wiper Malware Targeting Ukrainian Organizations 2022-03-15T20:45:00+00:00 https://securityintelligence.com/posts/caddywiper-malware-targeting-ukrainian-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=4287443 False Malware None None Security Intelligence - Site de news Américain Starting at Home: Cybersecurity in the Hybrid Workplace 2022-03-10T14:00:00+00:00 https://securityintelligence.com/articles/starting-home-cybersecurity-hybrid-workplace/ www.secnews.physaphae.fr/article.php?IdArticle=4254526 False Malware None None Security Intelligence - Site de news Américain New Wiper Malware Used Against Ukranian Organizations 2022-03-04T20:57:27+00:00 https://securityintelligence.com/posts/new-wiper-malware-used-against-ukranian-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=4228890 False Ransomware,Malware None None Security Intelligence - Site de news Américain IBM Security X-Force Research Advisory: New Destructive Malware Used In Cyber Attacks on Ukraine 2022-02-24T17:00:00+00:00 https://securityintelligence.com/posts/new-destructive-malware-cyber-attacks-ukraine/ www.secnews.physaphae.fr/article.php?IdArticle=4179641 False Malware None None Security Intelligence - Site de news Américain TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware 2022-02-02T17:00:00+00:00 https://securityintelligence.com/posts/trickbot-gang-template-based-metaprogramming-bazar-malware/ www.secnews.physaphae.fr/article.php?IdArticle=4072035 False Malware None None Security Intelligence - Site de news Américain TrickBot Bolsters Layered Defenses to Prevent Injection Research 2022-01-24T13:00:00+00:00 https://securityintelligence.com/posts/trickbot-bolsters-layered-defenses-prevent-injection/ www.secnews.physaphae.fr/article.php?IdArticle=4025310 False Ransomware,Malware None None Security Intelligence - Site de news Américain Ransomware Attackers\' New Tactic: Double Extortion 2021-12-23T14:00:00+00:00 https://securityintelligence.com/articles/ransomware-double-extortion/ www.secnews.physaphae.fr/article.php?IdArticle=3859755 False Ransomware,Malware None None Security Intelligence - Site de news Américain X-Force Threat Intelligence: Monthly Malware Roundup 2021-12-01T08:00:00+00:00 https://securityintelligence.com/posts/x-force-threat-intelligence-monthly-malware-roundup/ www.secnews.physaphae.fr/article.php?IdArticle=3741116 False Malware,Threat None None Security Intelligence - Site de news Américain Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds 2021-10-13T10:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/r3DvOZvslGE/ www.secnews.physaphae.fr/article.php?IdArticle=3508595 False Ransomware,Malware,Guideline None None Security Intelligence - Site de news Américain New ZE Loader Targets Online Banking Users 2021-09-23T15:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/BJsbLx-QFko/ www.secnews.physaphae.fr/article.php?IdArticle=3417829 False Malware None None Security Intelligence - Site de news Américain Double Encryption: When Ransomware Recovery Gets Complicated 2021-07-26T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/sQOB-g2W23o/ www.secnews.physaphae.fr/article.php?IdArticle=3134916 False Ransomware,Malware None None Security Intelligence - Site de news Américain RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation 2021-07-12T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/XPGeECryo1c/ www.secnews.physaphae.fr/article.php?IdArticle=3053069 False Malware None None Security Intelligence - Site de news Américain A Fly on ShellBot\'s Wall: The Risk of Publicly Available Cryptocurrency Miners 2021-06-29T16:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/4bxvZ4nhK9s/ www.secnews.physaphae.fr/article.php?IdArticle=2996374 False Malware None None Security Intelligence - Site de news Américain “Our IT teams have an Incident Response Plan. We\'re prepared for a cyberattack.” Maybe not. 2021-06-23T15:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/9PO4QRYuVVk/ www.secnews.physaphae.fr/article.php?IdArticle=2971833 False Ransomware,Malware None None Security Intelligence - Site de news Américain Ransomware Attack Response Should Extend Beyond Money to Your Team\'s Morale 2021-06-04T12:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/MD6Ecg2zr5g/ www.secnews.physaphae.fr/article.php?IdArticle=2874661 False Ransomware,Malware,Threat None None Security Intelligence - Site de news Américain Zero Trust or Bust: What It Is and Why It Matters to Data Security 2021-06-01T09:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/JBzyTTCtyb8/ www.secnews.physaphae.fr/article.php?IdArticle=2865092 False Malware,Threat None None Security Intelligence - Site de news Américain What is Ghimob Malware? 2021-05-07T12:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/l8OigDi27XU/ www.secnews.physaphae.fr/article.php?IdArticle=2751594 False Malware None None Security Intelligence - Site de news Américain The Story of FakeChat 2021-04-29T13:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/ImYbiMtGdYo/ www.secnews.physaphae.fr/article.php?IdArticle=2714631 False Malware,Threat None 2.0000000000000000 Security Intelligence - Site de news Américain The Sodinokibi Chronicles: A (R)Evil Cybercrime Gang Disrupts Organizations for Trade Secrets and Cash 2021-04-28T20:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/raEgYo9mWbM/ www.secnews.physaphae.fr/article.php?IdArticle=2710833 False Ransomware,Malware,Vulnerability None None Security Intelligence - Site de news Américain Cybersecurity Trends: Keeping Up With 2020\'s \'New Normal\' 2020-12-22T21:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/ZeneDX7j1nI/ www.secnews.physaphae.fr/article.php?IdArticle=2121323 False Malware None None Security Intelligence - Site de news Américain E-Commerce Skimming is the New POS Malware 2020-12-16T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/4DaOeVbqfdE/ www.secnews.physaphae.fr/article.php?IdArticle=2105137 False Malware,Studies None None Security Intelligence - Site de news Américain New Vizom Malware Discovered Targets Brazilian Bank Customers with Remote Overlay Attacks 2020-10-19T10:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/mPAjVt40bQs/ www.secnews.physaphae.fr/article.php?IdArticle=1985602 False Malware None None Security Intelligence - Site de news Américain A New Botnet Attack Just Mozied Into Town 2020-09-17T10:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/N8Riv6bmQ6U/ www.secnews.physaphae.fr/article.php?IdArticle=1922650 False Malware,Threat None 3.0000000000000000 Security Intelligence - Site de news Américain How Zero Trust Can Help Defend Against Ransomware Attacks 2020-08-07T10:55:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/dfUBVsbgvl0/ www.secnews.physaphae.fr/article.php?IdArticle=1853950 False Ransomware,Malware None None Security Intelligence - Site de news Américain Ginp Malware Operations are on the Rise, Aiming to Expand in Turkey 2020-06-18T11:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Stk80j8ASOQ/ www.secnews.physaphae.fr/article.php?IdArticle=1770441 False Malware None None Security Intelligence - Site de news Américain Multifactor Authentication: The Next Battleground 2020-06-11T12:48:41+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/UIVPcMVJiI0/ www.secnews.physaphae.fr/article.php?IdArticle=1761745 False Malware None None Security Intelligence - Site de news Américain Stronger Together - Building Cyber Resilience 2020-06-01T10:15:25+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/05CEVNorBtk/ www.secnews.physaphae.fr/article.php?IdArticle=1744212 False Malware None None Security Intelligence - Site de news Américain Grandoreiro Malware Now Targeting Banks in Spain 2020-04-13T12:55:53+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/lqLTawk27c0/ www.secnews.physaphae.fr/article.php?IdArticle=1652611 False Malware,Threat None None Security Intelligence - Site de news Américain EnigmaSpark: Politically Themed Cyber Activity Highlights Regional Opposition to Middle East Peace Plan 2020-03-18T10:00:51+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/hG7VI0R_rgM/ www.secnews.physaphae.fr/article.php?IdArticle=1604465 False Malware None None Security Intelligence - Site de news Américain CamuBot Resurfaces With Cross-Channel, Targeted Attacks in Brazil 2020-02-03T11:00:37+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/VgqIsOknBx8/ www.secnews.physaphae.fr/article.php?IdArticle=1522783 False Malware None None Security Intelligence - Site de news Américain Has Necurs Fallen From (Cybercrime) Grace? Elite Malware Botnet Now Distributes Clunky Scams 2020-01-27T11:30:28+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/6r7MO9Qw7Uo/ www.secnews.physaphae.fr/article.php?IdArticle=1511809 False Malware None None Security Intelligence - Site de news Américain New NetWire RAT Campaigns Use IMG Attachments to Deliver Malware Targeting Enterprise Users 2020-01-21T11:00:25+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/_WbKg8pSkPs/ www.secnews.physaphae.fr/article.php?IdArticle=1502608 False Malware None None Security Intelligence - Site de news Américain What Is the Biggest Challenge Facing Endpoint Security? Hint: It\'s Not Malware 2020-01-02T11:00:20+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/Q8445IgdJIg/ www.secnews.physaphae.fr/article.php?IdArticle=1495500 False Malware None None Security Intelligence - Site de news Américain The Role of Evil Downloaders in the Android Mobile Malware Kill Chain 2019-11-27T11:00:32+00:00 https://securityintelligence.com/posts/the-role-of-evil-downloaders-in-the-android-mobile-malware-kill-chain/ www.secnews.physaphae.fr/article.php?IdArticle=1489564 False Malware None None Security Intelligence - Site de news Américain Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention Reading Time: 4 minutes If CISOs could make one cybersecurity issue vanish, malware would top the list. While there's no silver-bullet solutions, the world of magic offers insights for effective malware prevention. ]]> 2019-08-29T10:01:00+00:00 https://securityintelligence.com/articles/disappearing-act-what-magic-tricks-can-teach-cisos-about-malware-prevention/ www.secnews.physaphae.fr/article.php?IdArticle=1293018 False Malware None None Security Intelligence - Site de news Américain How Video Became a Dangerous Delivery Vehicle for Malware Attacks Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here's how your enterprise security team can fight back. ]]> 2019-08-19T10:30:03+00:00 https://securityintelligence.com/articles/how-video-became-a-dangerous-delivery-vehicle-for-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1271087 False Malware None 4.0000000000000000 Security Intelligence - Site de news Américain The Curious Case of a Fileless TrickBot Infection Reading Time: 7 minutes IBM X-Force noted changes in the deployment of the TrickBot Trojan and discovered that the most recent version of the malware is fileless. ]]> 2019-08-08T11:15:03+00:00 https://securityintelligence.com/posts/the-curious-case-of-a-fileless-trickbot-infection/ www.secnews.physaphae.fr/article.php?IdArticle=1250568 False Malware None None Security Intelligence - Site de news Américain I Can\'t Believe Mirais: Tracking the Infamous IoT Malware 2019-07-18T10:00:03+00:00 https://securityintelligence.com/posts/i-cant-believe-mirais-tracking-the-infamous-iot-malware-2/ www.secnews.physaphae.fr/article.php?IdArticle=1212329 False Malware,Threat None None Security Intelligence - Site de news Américain HawkEye Malware Operators Renew Attacks on Business Users IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world. ]]> 2019-05-27T12:35:02+00:00 https://securityintelligence.com/hawkeye-malware-operators-renew-attacks-on-business-users/ www.secnews.physaphae.fr/article.php?IdArticle=1127540 False Malware None None Security Intelligence - Site de news Américain How to Fight Back Against Macro Malware Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity? ]]> 2019-05-20T11:00:02+00:00 https://securityintelligence.com/how-to-fight-back-against-macro-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1116278 False Malware None None Security Intelligence - Site de news Américain How to Defend Your Organization Against Fileless Malware Attacks Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques. ]]> 2019-04-17T12:45:01+00:00 https://securityintelligence.com/how-to-defend-your-organization-against-fileless-malware-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=1094165 False Malware None None Security Intelligence - Site de news Américain What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads? ]]> 2019-04-12T12:00:02+00:00 https://securityintelligence.com/what-happens-when-malware-sneaks-into-reputable-hardware-applications-and-app-stores/ www.secnews.physaphae.fr/article.php?IdArticle=1093188 False Malware None None Security Intelligence - Site de news Américain Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns 2019-04-08T10:00:05+00:00 https://securityintelligence.com/cybercriminals-spoof-major-accounting-and-payroll-firms-in-tax-season-malware-campaigns/ www.secnews.physaphae.fr/article.php?IdArticle=1091914 False Malware None None Security Intelligence - Site de news Américain Cryptojacking Attacks: Who\'s Mining on Your Coin? 2019-04-05T11:45:04+00:00 https://securityintelligence.com/cryptojacking-attacks-whos-mining-on-your-coin/ www.secnews.physaphae.fr/article.php?IdArticle=1090609 False Malware None None Security Intelligence - Site de news Américain How a Cunning Remote Overlay Malware Met Its Match A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling. ]]> 2019-04-04T15:20:03+00:00 https://securityintelligence.com/how-a-cunning-remote-overlay-malware-met-its-match/ www.secnews.physaphae.fr/article.php?IdArticle=1089122 False Malware,Threat None None Security Intelligence - Site de news Américain Preparing for the Unpredictable: Security in a New World of Mobile Malware Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats. ]]> 2019-04-04T14:40:01+00:00 https://securityintelligence.com/preparing-for-the-unpredictable-security-in-a-new-world-of-mobile-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1088986 False Malware None 2.0000000000000000 Security Intelligence - Site de news Américain Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms. ]]> 2019-03-15T13:55:01+00:00 https://securityintelligence.com/will-we-see-the-rise-of-vaporworms-and-other-new-fileless-attacks-in-2019/ www.secnews.physaphae.fr/article.php?IdArticle=1071297 False Malware None None Security Intelligence - Site de news Américain Hey Siri, Get My Coffee, Hold the Malware According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts. ]]> 2019-01-31T11:00:03+00:00 https://securityintelligence.com/hey-siri-get-my-coffee-hold-the-malware/ www.secnews.physaphae.fr/article.php?IdArticle=1016479 False Malware None None Security Intelligence - Site de news Américain Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale. ]]> 2018-12-14T12:20:02+00:00 https://securityintelligence.com/stay-on-top-of-zero-day-malware-attacks-with-smart-mobile-threat-defense/ www.secnews.physaphae.fr/article.php?IdArticle=945962 False Malware,Threat None None Security Intelligence - Site de news Américain The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware. ]]> 2018-12-10T12:10:02+00:00 https://securityintelligence.com/the-simpler-the-better-looking-deeper-into-the-malware-used-in-brazilian-financial-cybercrime/ www.secnews.physaphae.fr/article.php?IdArticle=943002 False Malware None 4.0000000000000000 Security Intelligence - Site de news Américain \'Tis the Season for Spreading Ad Malware 2018-12-03T13:15:02+00:00 https://securityintelligence.com/tis-the-season-for-spreading-ad-malware/ www.secnews.physaphae.fr/article.php?IdArticle=932189 False Malware None 5.0000000000000000 Security Intelligence - Site de news Américain How to Defend Against Malvertising Drive-By Attacks Malvertising - malware delivered by internet advertisements - can infect your computer even if you don't click on it. But there are steps you can take to protect yourself now. ]]> 2018-11-27T17:30:01+00:00 https://securityintelligence.com/how-to-defend-against-malvertising-drive-by-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=922537 False Malware None None Security Intelligence - Site de news Américain Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime. ]]> 2018-11-21T12:50:02+00:00 https://securityintelligence.com/easy-does-it-a-timely-look-into-fraud-ttps-in-the-brazilian-financial-cybercrime-landscape/ www.secnews.physaphae.fr/article.php?IdArticle=910075 False Malware None None Security Intelligence - Site de news Américain Is Malware Analysis Right for Your Business? For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis. ]]> 2018-10-26T11:15:01+00:00 https://securityintelligence.com/is-malware-analysis-right-for-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=864069 False Malware None None Security Intelligence - Site de news Américain Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it's crucial to establish network security policies for your home IT just as you would at work. ]]> 2018-10-03T12:10:02+00:00 https://securityintelligence.com/bringing-it-all-back-home-why-you-should-apply-enterprise-network-security-policies-to-your-smart-home/ www.secnews.physaphae.fr/article.php?IdArticle=829851 False Malware,Threat None None Security Intelligence - Site de news Américain Ransomware 101: What Is Ransomware and How Can You Protect Your Business? What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether. ]]> 2018-09-20T11:55:04+00:00 https://securityintelligence.com/ransomware-101-what-is-ransomware-and-how-can-you-protect-your-business/ www.secnews.physaphae.fr/article.php?IdArticle=817277 False Ransomware,Malware,Threat None None Security Intelligence - Site de news Américain X-Force IRIS Identifies FIN6 Activity on POS Networks IBM X-Force IRIS identified a cybergang known as FIN6 using the FrameworkPOS and GratefulPOS malware to harvest massive amounts of payment card data from point-of-sale (POS) systems. ]]> 2018-09-05T12:25:05+00:00 https://securityintelligence.com/x-force-iris-identifies-fin6-activity-on-pos-networks/ www.secnews.physaphae.fr/article.php?IdArticle=793530 False Malware None None Security Intelligence - Site de news Américain CamuBot: New Financial Malware Targets Brazilian Banking Customers IBM X-Force researchers identified new financial malware, dubbed CamuBot, that attempts to camouflage itself as a security module required by the Brazilian banks it targets. ]]> 2018-09-04T10:00:05+00:00 https://securityintelligence.com/camubot-new-financial-malware-targets-brazilian-banking-customers/ www.secnews.physaphae.fr/article.php?IdArticle=791791 False Malware None None Security Intelligence - Site de news Américain DeepLocker: How AI Can Power a Stealthy New Breed of Malware DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know. ]]> 2018-08-08T10:01:01+00:00 https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/ www.secnews.physaphae.fr/article.php?IdArticle=770873 False Malware None 3.0000000000000000 Security Intelligence - Site de news Américain Anubis Strikes Again: Mobile Malware Continues to Plague Users in Official App Stores IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis. ]]> 2018-07-10T11:20:01+00:00 https://securityintelligence.com/anubis-strikes-again-mobile-malware-continues-to-plague-users-in-official-app-stores/ www.secnews.physaphae.fr/article.php?IdArticle=738459 False Malware None None