www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:40:08+00:00 www.secnews.physaphae.fr Bleeping Computer - Magazine Américain Student health insurance carrier Guard.me suffers a data breach 2021-05-17T20:57:51+00:00 https://www.bleepingcomputer.com/news/security/student-health-insurance-carrier-guardme-suffers-a-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2803340 False Data Breach,Vulnerability,Threat None None We Live Security - Editeur Logiciel Antivirus ESET Verizon\'s 2021 DBIR: Phishing and ransomware threats looming ever larger 2021-05-14T19:18:41+00:00 http://feedproxy.google.com/~r/eset/blog/~3/F4Ff-c1STnQ/ www.secnews.physaphae.fr/article.php?IdArticle=2792223 False Ransomware,Data Breach None None Kaspersky Threatpost - Kaspersky est un éditeur antivirus russe Verizon: Pandemic Ushers in ⅓ More Cyber-Misery 2021-05-14T13:26:48+00:00 https://threatpost.com/verizon-pandemic-cyber-misery/166168/ www.secnews.physaphae.fr/article.php?IdArticle=2786087 False Data Breach None None Veracode - Application Security Research, News, and Education Blog 2021 Verizon Data Breach Investigations Report Proves That Cybercrime Continued to Thrive During the Pandemic Verizon recently published its 2021 Data Breach Investigations Report (DBIR). This year, Verizon analyzed 79,635 incidents, of which 29,207 met their quality standards and 5,258 were confirmed data breaches, from 88 countries around the world. Despite the global pandemic, the DBIR uncovered that cybercrime continued to thrive. Like previous years, the majority of breaches were financially motivated, and most were caused by external actors illegally accessing data. Threat actors Threat actor motives Phishing, ransomware, and web app attacks ??ヲ Oh my! Phishing and ransomware attacks, along with the continued high number of web application attacks, dominated the data breaches for 2021. Phishing attacks were present in a whopping 36 percent of breaches in this year???s dataset, representing an 11 percent increase from last year. Covid varieties Ransomware attacks increased by 6 percent, accounting for 10 percent of breaches. This increase can likely be attributed to new tactics where ransomware now steals the data as it encrypts it. Ransomware has also proven to be very efficient for cybercriminals. It doesn???t take a lot of hands on keyboards and it???s a relatively easy way for cybercriminals to make a quick buck. Web applications made up 39 percent of all data breaches. Most of the web applications attacked were cloud-based, which isn???t surprising giving the increased shift to digital during the pandemic. The majority of web application attacks were through stolen credentials or brute-force attacks. 95 percent of organizations that suffered a credentials management attack experienced between 637 to 3.3 billion malicious login attempts throughout the year. Top hacking varieties If you look at breaches by region, EMEA ??? comprised of Europe, the Middle East, and Africa ??? had the highest proportion of web application attacks. This is the second year in a row that web applications accounted for the majority (54 percent) of breaches in EMEA. Not surprisingly, the most commonly breached data type in EMEA was credentials ??? which goes hand-in-hand with web attacks.ツ? Patterns in EMEA breaches In Asia, web application attacks fell second to social engineering attacks and in North America, web application attacks fell third ??? behind social engineering and system intrusion. Web application threats were also prevalent across the 11 examined industries, especially in the information industry. The retail industry, which has notoriously been susceptible to web application attacks, has decreased its proportion of web application breaches. What can organizations do to prevent web application attacks? ]]> 2021-05-14T10:33:26+00:00 https://www.veracode.com/blog/security-news/2021-verizon-data-breach-investigations-report-proves-cybercrime-continued www.secnews.physaphae.fr/article.php?IdArticle=2786280 False Ransomware,Data Breach None None InformationSecurityBuzzNews - Site de News Securite Experts Responses on Verizon DBiR Findings 2021-05-13T11:07:13+00:00 https://informationsecuritybuzz.com/expert-comments/experts-responses-on-verizon-dbir-findings/ www.secnews.physaphae.fr/article.php?IdArticle=2779125 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Kansas Identity Theft Spike Could Be Linked to Data Breach 2021-05-11T18:04:00+00:00 https://www.infosecurity-magazine.com:443/news/kansas-identity-theft-spike/ www.secnews.physaphae.fr/article.php?IdArticle=2769216 False Data Breach,Guideline None None InformationSecurityBuzzNews - Site de News Securite Expert Commentary: CaptureRx Data Breach 2021-05-11T15:11:30+00:00 https://informationsecuritybuzz.com/expert-comments/expert-commentary-capturerx-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2768233 False Data Breach None None SecurityWeek - Security News City of Chicago Hit by Data Breach at Law Firm Jones Day 2021-05-10T11:06:17+00:00 http://feedproxy.google.com/~r/Securityweek/~3/O09YoH5zmZI/city-chicago-hit-data-breach-law-firm-jones-day www.secnews.physaphae.fr/article.php?IdArticle=2760825 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Lawsuit Filed Over Contact Tracing Data Breach 2021-05-07T16:25:00+00:00 https://www.infosecurity-magazine.com:443/news/lawsuit-filed-over-contact-tracing/ www.secnews.physaphae.fr/article.php?IdArticle=2752600 False Data Breach None None IT Security Guru - Blog Sécurité Three US healthcare providers suffer data breach 2021-05-07T15:41:46+00:00 https://www.itsecurityguru.org/2021/05/07/three-us-healthcare-providers-suffer-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=three-us-healthcare-providers-suffer-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2752501 False Ransomware,Data Breach None None Security Intelligence - Site de news Américain 3 Ways to Reduce the Cost of a Government Data Breach 2021-05-07T14:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/XULOy4Htet4/ www.secnews.physaphae.fr/article.php?IdArticle=2752301 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine CaptureRx Data Breach Impacts Healthcare Providers 2021-05-06T16:05:00+00:00 https://www.infosecurity-magazine.com:443/news/capturerx-data-breach-impacts/ www.secnews.physaphae.fr/article.php?IdArticle=2746845 False Data Breach None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Password security tips and best practices for enterprises Lastpass survey, US employees working in mid-sized corporate businesses must manage approximately 75 passwords for work. Unsurprisingly, employees recycle passwords 13 times on average. In other words, employees are using the same passwords over and over. And in many cases, especially for corporate applications and resources that lack strong password requirements, some passwords just aren’t strong enough. Cybercriminals know this, and it’s why breaches happen. If hackers get access to your trusted data, the ramifications can be dire. The costs of a data breach go well beyond financial, and include damage to your company’s brand, trust and reputation. Why do we need stronger and longer passwords? As malware, phishing, and ransomware continue to skyrocket, we must understand that the password is the primary method for attackers to gain access to corporate systems.  Phishing passwords may be the easiest method, but passwords can also be cracked. The stronger the password, the harder it is for cybercriminals to decode. In a typical attack—the brute force password attack—attackers will use software that quickly attempts every possible password combination of numbers, letters, and symbols. These software programs get better as computing power increases. For example, an eight-character strong password was not long ago considered secure and difficult to crack. Today, it can be cracked in eight hours. But if we tack on two more characters to make it ten-character, cracking the password can take approximately five years.  Why do we need unique passwords for every login? As mentioned above, phishing is one of the simplest ways for hackers to steal our passwords. If you think your company has been victimized by phishing, malware, or ransomware, perhaps you’ve taken steps to reset those passwords. But the security risk here is if employees are using the same passwords for different apps, sites or resources. Have you heard about credential stuffing? With credential stuffing, attackers take username and password combinations they already know (which have been stolen or paid for on the dark web) and try them everywhere they can. Use of credential stuffing is escalating, and businesses of all sizes should take note. This type of attack is only successful if and when employees use the same password for different logins. What about password managers? Managing all those passwords doesn’t have to be complicated. A password management system is software that keeps an up-to-date list of all your passwords and logins, using a master password to access the password “vault”. That master password is the only one you need to remember. What if a hacker accesses your vault? Isn’t that riskier? Sure, there is undoubtedly an element of risk, but it’s critical to think in terms of relative safety. As a general rule, using some type of password ]]> 2021-05-06T10:00:00+00:00 https://feeds.feedblitz.com/~/651048994/0/alienvault-blogs~Password-security-tips-and-best-practices-for-enterprises www.secnews.physaphae.fr/article.php?IdArticle=2745384 False Ransomware,Data Breach,Hack LastPass None Bleeping Computer - Magazine Américain U.S. Agency for Global Media data breach caused by a phishing attack 2021-05-04T19:54:24+00:00 https://www.bleepingcomputer.com/news/security/us-agency-for-global-media-data-breach-caused-by-a-phishing-attack/ www.secnews.physaphae.fr/article.php?IdArticle=2739982 False Data Breach None None Anomali - Firm Blog Anomali Cyber Watch: Microsoft Office SharePoint Servers Targeted with Ransomware, New Commodity Crypto-Stealer and RAT, Linux Backdoor Targeting Users for Years, and More Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence Python Also Impacted by Critical IP Address Validation Vulnerability (published: May 1, 2021) Researchers have recently discovered that a bug previously discovered in netmask (a tool to assist with IP address scoping) is also present in recent versions of Python 3. The bug involves the handling of leading zeroes in decimal represented IP addresses. Instead of interpreting these as octal notation as specified in the standard, the python ipaddress library strips these and interprets the initial zero and interprets the rest as a decimal. This could allow unauthenticated remote attackers to perform a number of attacks against programs that rely on python's stdlib ipdaddress library, including Server-Side Request Forgery (SSRF), Remote File Inclusion (RFI), and Local File Inclusion (LFI). Analyst Comment: Best practices for developers include input validation and sanitization, which in this case would avoid this bug by validating or rejecting IP addresses. Additionally regular patch and update schedules will allow for rapid addressing of bugs as they are discovered and patches delivered. Proper network monitoring and policies are also an important part of protecting against these types of attacks. Tags: CVE-2021-29921, python Codecov Begins Notifying Affected Customers, Discloses IOCs (published: April 30, 2021) Codecov has disclosed multiple IP addresses as IOCs that were used by the threat actors to collect sensitive information (environment variables) from the affected customers. The company disclosed a supply-chain breach on April 15, 2021, and has now begun notifying customers. The breach went undiscovered for 2 months, and leveraged the Codecov Bash Uploader scripts used by a large number of projects. Analyst Comment: In light of the increasing frequency and sophistication of supply chain attacks, companies should carefully audit, examine, and include in their threat modelling means of mitigating and detecting third party compromises. A resilient and tested backup and restore policy is an important part of the overall security strategy. Tags: North America, Codecov, supply chain FBI Teams up with ‘Have I Been Pwned’ to Alert Emotet Victims (published: April 30, 2021) The FBI has shared more than 4.3 million email addresses with data breach tracking site Have I Been Pwned. The data breach notification site allows you to check if your login credentials may have been compromised by Emotet. In total, 4,324,770 email addresses were provided which span a wide range of countries and domains. The addresses are actually sourced from 2 separate corpuses of data obtained by the agencies. Analyst Comment: Frequently updated endpoint detection policies as well as network security]]> 2021-05-04T15:25:00+00:00 https://www.anomali.com/blog/anomali-cyber-watch-microsoft-office-sharepoint-servers-targeted-with-ransomware-new-commodity-crypto-stealer-and-rat-linux-backdoor-targeting-users-for-years-and-more www.secnews.physaphae.fr/article.php?IdArticle=2742391 False Ransomware,Data Breach,Malware,Tool,Vulnerability,Threat,Patching,Guideline None None Wired Threat Level - Security News Then a Hacker Began Posting Patients\' Deepest Secrets Online 2021-05-04T11:00:00+00:00 https://www.wired.com/story/vastaamo-psychotherapy-patients-hack-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2737058 False Data Breach None 5.0000000000000000 Security Affairs - Blog Secu Most Common Causes of Data Breach and How to Prevent It 2021-05-03T14:42:52+00:00 https://securityaffairs.co/wordpress/117480/security/data-breach-causes.html?utm_source=rss&utm_medium=rss&utm_campaign=data-breach-causes www.secnews.physaphae.fr/article.php?IdArticle=2733164 False Data Breach None None IT Security Guru - Blog Sécurité Dorset police investigating data breach 2021-04-30T07:57:44+00:00 https://www.itsecurityguru.org/2021/04/30/dorset-police-investigating-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=dorset-police-investigating-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2720126 False Data Breach None None Graham Cluley - Blog Security DigitalOcean admits data breach exposed customers\' billing details 2021-04-30T07:30:29+00:00 https://hotforsecurity.bitdefender.com/blog/digitalocean-admits-data-breach-exposed-customers-billing-details-25754.html www.secnews.physaphae.fr/article.php?IdArticle=2720021 False Data Breach APT 32 None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach ]]> 2021-04-30T00:24:38+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/7GQI-1KUe-E/passwordstate-warns-of-ongoing-phishing.html www.secnews.physaphae.fr/article.php?IdArticle=2720041 False Data Breach,Threat None None We Live Security - Editeur Logiciel Antivirus ESET FBI teams up with \'Have I Been Pwned\' to alert Emotet victims 2021-04-29T15:22:48+00:00 http://feedproxy.google.com/~r/eset/blog/~3/p6UgxQ8D7-o/ www.secnews.physaphae.fr/article.php?IdArticle=2721777 False Data Breach None None Graham Cluley - Blog Security Etsy-owned musical instrument marketplace Reverb suffers data breach 2021-04-28T17:52:18+00:00 https://hotforsecurity.bitdefender.com/blog/etsy-owned-musical-instrument-marketplace-reverb-suffers-data-breach-25741.html www.secnews.physaphae.fr/article.php?IdArticle=2709858 False Data Breach None None Bleeping Computer - Magazine Américain DigitalOcean data breach exposes customer billing information 2021-04-28T16:09:13+00:00 https://www.bleepingcomputer.com/news/security/digitalocean-data-breach-exposes-customer-billing-information/ www.secnews.physaphae.fr/article.php?IdArticle=2710746 False Data Breach APT 32 None InfoSecurity Mag - InfoSecurity Magazine Online Music Marketplace Suffers Data Breach 2021-04-27T16:23:00+00:00 https://www.infosecurity-magazine.com:443/news/online-music-marketplace-suffers/ www.secnews.physaphae.fr/article.php?IdArticle=2704258 False Data Breach None None Bleeping Computer - Magazine Américain MangaDex discloses data breach after stolen database shared online 2021-04-27T10:46:26+00:00 https://www.bleepingcomputer.com/news/security/mangadex-discloses-data-breach-after-stolen-database-shared-online/ www.secnews.physaphae.fr/article.php?IdArticle=2704159 True Data Breach,Threat None None Bleeping Computer - Magazine Américain MangaDex discloses data breach after stolen data gets shared online 2021-04-27T10:46:26+00:00 https://www.bleepingcomputer.com/news/security/mangadex-discloses-data-breach-after-stolen-data-gets-shared-online/ www.secnews.physaphae.fr/article.php?IdArticle=2703428 False Data Breach,Threat None None Bleeping Computer - Magazine Américain Reverb discloses data breach exposing musicians\' personal info 2021-04-26T17:10:48+00:00 https://www.bleepingcomputer.com/news/security/reverb-discloses-data-breach-exposing-musicians-personal-info/ www.secnews.physaphae.fr/article.php?IdArticle=2698881 False Data Breach None None SecurityWeek - Security News Oilfield Services Company Gyrodata Discloses Data Breach 2021-04-26T15:05:53+00:00 http://feedproxy.google.com/~r/Securityweek/~3/8ArNEIOnai4/oilfield-services-company-gyrodata-discloses-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2696681 False Data Breach None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC The 5 most crucial Cybersecurity updates for businesses in 2021 internet crime reports rising 69.4% and costing more than $4.2 billion. Now that more companies are embracing digital services after the pandemic, this trend will likely continue. All businesses, regardless of size or industry, must revisit their cybersecurity. Here are the five most important cybersecurity updates for this year. 1. Implementing a Zero-Trust framework The single most crucial cybersecurity upgrade for businesses this year is adopting a zero-trust security framework. These systems, which rely on network segmentation and thorough user verification, aren’t new but are increasingly crucial. In light of rising cyberthreats, companies can’t afford to trust anything inside or outside their networks without proof. A 2020 survey found that 82% of company leaders plan to let their employees work remotely at least part time after the pandemic. That many people accessing data remotely raises security concerns. Hackers could pose as remote workers to gain access or install spyware, and IT teams wouldn’t know it. Zero-trust models mitigate these threats. Verifying user identity at every step helps guarantee only employees can access mission-critical data. Segmentation ensures that only those who need access can get it, and if a breach occurs, it won’t impact the entire network. 2. Securing machine learning training data Machine learning algorithms are becoming increasingly common among companies in various industries. These models take considerable amounts of data to train, which presents an enticing opportunity for cybercriminals. As more companies rely on machine learning, more threat actors will likely try to poison the training data. By injecting incorrect or corrupt data into the training pool, cybercriminals could manipulate a machine learning system. If companies don’t catch the problem before it’s too late, the algorithms they rely on could influence poor or even harmful business decisions. Given this threat, securing machine learning training data is a must. Businesses should carefully inspect the information they use to train machine learning models. They should also enact stricter access controls over training pools, including activity monitoring. 3. Verifying third-party and partner security Businesses should also look outward when improving their cybersecurity. The growing public awareness of cyberthreats is changing expectations about visibility, and that’s a good thing. It’s no longer sufficient to trust that a business partner or third party has robust data security. Companies must verify it. Third-party data breaches in 2020 exposed millions of records, and major events like the SolarWinds hack have revealed how fragile some systems are. In light of these risks, businesses must ask all potential partners to prove]]> 2021-04-26T10:00:00+00:00 https://feeds.feedblitz.com/~/650096666/0/alienvault-blogs~The-most-crucial-Cybersecurity-updates-for-businesses-in www.secnews.physaphae.fr/article.php?IdArticle=2694605 False Data Breach,Hack,Threat,Guideline None None InfoSecurity Mag - InfoSecurity Magazine US Drilling Giant Gyrodata Reveals Employee Data Breach 2021-04-26T08:39:00+00:00 https://www.infosecurity-magazine.com:443/news/us-drilling-giant-gyrodata/ www.secnews.physaphae.fr/article.php?IdArticle=2694353 False Ransomware,Data Breach None None Veracode - Application Security Research, News, and Education Blog Reporting Live From Collision Conference 2021: Part Two! If you caught part one of our recap series on this year???s Collision conference, you know we covered a roundtable talk hosted by Veracode???s own Chris Wysopal. The talk focused on the risks of AI and machine learning, delving into discussions of how to manage the security aspects of these future-ready technologies ???ツ?especially when it comes down to consumer privacy.ツ? Chris also had the opportunity to host a session of his own, covering the critical aspects of modern application security and the reasons that organizations need to get serious about security-minded approaches to their code. Here???s what we learned.ツ? Secure from the top down Chris began his session Secure From the Top Down by noting that, today, it???s important to think about application and product security through the eyes of the developer or the builder. With so many applications running in the cloud and so many devices connected to the Internet of Things (IoT), Chris pointed out that the attack surface for threat actors is growing exponentially and that everyone building and deploying technology needs to consider the risks moving forward. Connected devices are everywhere, Chris said, but they???re not typically behind a firewall. Normally, these devices are connected to 5G or Wi-Fi. According to Chris, this means devices essentially need to secure themselves and all of the connection points where they talk to other devices or they pose a security risk.ツ? Further, everything is connected through APIs today. ???We used to have big, monolithic software packages with one big block of code,??? Chris said. ???Today, we have a lot of small devices; even with applications running in the cloud, they???re built with microservices and are talking to each other through APIs.??? This is a way an attacker can exploit a device or an application, and means the builders of today need to improve the security around their APIs for a more secure tomorrow. It???s already a problem; Chris pointed out in his session that, according to the 2020 Verizon Data Breach Investigations Report, 43 percent of breaches come from single page applications. Developers working on building these single page apps need to be more considerate with their security.ツ? Looking ahead at trends Time is the biggest competitor for most organizations, according to Chris, and there are three main trends that are going to impact product security moving forward: ubiquitous connectivity, abstraction and componentization, and hyperautomation of software delivery.ツ? Ubiquitous connectivity While this involves the rise of APIs and IoT devices, what it really comes down to is that each piece of software connected through the network and APIs must think about securing itself. ???Each code that is exposing an API needs to think about how it will authenticate, encrypt, and secure itself from all]]> 2021-04-23T09:34:12+00:00 https://www.veracode.com/blog/customer-news/reporting-live-collision-conference-2021-part-two www.secnews.physaphae.fr/article.php?IdArticle=2683638 False Data Breach,Threat,Patching None None InformationSecurityBuzzNews - Site de News Securite Eversource Energy Data Breach Comment 2021-04-22T11:52:42+00:00 https://informationsecuritybuzz.com/expert-comments/the-increased-attack-surface-of-cloud-environments-makes-for-a-potentially-weak-overall-security-posture/ www.secnews.physaphae.fr/article.php?IdArticle=2678028 False Data Breach None None Graham Cluley - Blog Security Smashing Security podcast #224: The Lazarus Heist, Facebook faux pas, and no-cost security 2021-04-22T08:30:22+00:00 https://grahamcluley.com/smashing-security-podcast-224/ www.secnews.physaphae.fr/article.php?IdArticle=2677532 False Data Breach APT 38,APT 28 None Kovrr - cyber risk management platform Travailler à domicile: une année en revue les entreprises sont obligées de permettre à leurs employés de travailler à distance, la surface d'attaque devient plus large.<br>Working From Home: A Year in ReviewAs companies are obliged to allow their employees to work remotely, the attack surface becomes broader.Read More 2021-04-22T00:00:00+00:00 https://www.kovrr.com/reports/working-from-home-a-year-in-review www.secnews.physaphae.fr/article.php?IdArticle=8393606 False Ransomware,Data Breach,Malware,Tool,Vulnerability None 3.0000000000000000 CybeReason - Vendor blog CISO Stories Podcast: He Fought the FTC Over a Breach and Won CISO Stories Podcast: He Fought the FTC Over a Breach and Won Hopefully, you won't ever have to hire a lawyer to defend yourself against a government regulator. So what happens when the Federal Trade Commission or other powerful body baselessly accuses your company of wrongdoing where a data breach is concerned?]]> 2021-04-21T14:16:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-he-fought-the-ftc-over-a-breach-and-won www.secnews.physaphae.fr/article.php?IdArticle=2674777 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Dating Service Suffers Data Breach 2021-04-20T19:53:00+00:00 https://www.infosecurity-magazine.com:443/news/dating-service-suffers-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2672586 False Data Breach None None Graham Cluley - Blog Security Facebook suffers a data breach about how it\'s hoping to stop the media talking about its last data breach 2021-04-20T15:47:59+00:00 https://grahamcluley.com/facebook-suffers-a-data-breach-about-how-its-hoping-to-stop-the-media-talking-about-its-last-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2671170 False Data Breach None None Bleeping Computer - Magazine Américain Eversource Energy data breach caused by unsecured cloud storage 2021-04-20T13:45:02+00:00 https://www.bleepingcomputer.com/news/security/eversource-energy-data-breach-caused-by-unsecured-cloud-storage/ www.secnews.physaphae.fr/article.php?IdArticle=2671719 False Data Breach None None SecurityWeek - Security News Auto Insurance Giant GEICO Discloses Data Breach 2021-04-20T12:27:09+00:00 http://feedproxy.google.com/~r/Securityweek/~3/Z5i43EIqtHo/car-insurance-company-geico-discloses-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2670539 False Data Breach None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Introducing AT&T\'s Managed Endpoint Security with SentinelOne 2020 MITRE ATT&CK test - APT 29 for most total detections and most correlated alerts through comprehensive storyline technology. This autonomous agent utilizes Artificial Intelligence (AI) and machine learning (ML) to help protect against known and unknown threats and eliminates reliance on external factors for protection. This faster, “machine-speed” detection & response provides continuous protection, even when offline. And, in the event of an attack, the SentinelOne agent can perform 1-click remediation and rollback with no custom scripting or re-imaging required. Deep integration with AT&T’s USM platform and Alien Labs OTX AT&T Cybersecurity and SentinelOne bring one of the most unique combinations in the market via the deep integrations between the SentinelOne platform and the AT&T USM platform. This deep integration allows for orchestrated and automated incident response on the endpoints. Additionally, deep integrations were built between the world’s largest open threat intelligence community, AT&T Alien Labs Open Threat Exchange (OTX), and the SentinelOne agent. The AT&T Alien Labs OTX encompasses over 145,000 security professionals submitting over 20 million threat indicators per day. Additional context is provided from the USM sensor network with an additional 20 million threat observations per day and AT&T’s Chief Security Office analyzing over 446 PB of traffic from 200 countries and territories. By correlating the incidents of compromise from AT&T Alien Labs OTX, AT&T is able to deliver added context that allows for faster responses. These same AT&T Alien Labs detections and threat intelligence also informs threat hunting on SentinelOne’s EDR data to help yield richer insights and easier detection of evasive threats. Expert management As one of the world's top MSSPs, AT&T Cybersecurity employs highly experienced and industry certified individuals for the Managed Endpoint Security with SentinelOne offering. AT&T brings over 25 years of experience in delivering managed security services and knows what it takes to keep pace with the dynamic threat landscape. To stay ahead, AT&T’s security analysts maintain security certifications including GSE, CISSP, CEH, and more.  For the Managed Endpoint Security with SentinelOne offering, AT&T ]]> 2021-04-19T20:38:00+00:00 https://feeds.feedblitz.com/~/649544360/0/alienvault-blogs~Introducing-ATampT%e2%80%99s-Managed-Endpoint-Security-with-SentinelOne www.secnews.physaphae.fr/article.php?IdArticle=2668051 False Data Breach,Threat,Guideline APT 29 None Bleeping Computer - Magazine Américain Geico data breach exposed customers\' driver\'s license numbers 2021-04-19T18:27:46+00:00 https://www.bleepingcomputer.com/news/security/geico-data-breach-exposed-customers-drivers-license-numbers/ www.secnews.physaphae.fr/article.php?IdArticle=2668413 False Data Breach,Threat None None Graham Cluley - Blog Security Six million male members may have been exposed after hack of gay dating service 2021-04-19T15:46:19+00:00 https://grahamcluley.com/six-million-male-members-may-have-been-exposed-after-hack-of-gay-dating-service/ www.secnews.physaphae.fr/article.php?IdArticle=2666526 False Data Breach,Hack None None IT Security Guru - Blog Sécurité Domino\'s India suffers data breach 2021-04-19T15:42:02+00:00 https://www.itsecurityguru.org/2021/04/19/dominos-india-suffers-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=dominos-india-suffers-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2666611 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite Facebook Facing Mass Legal Action Over Data Breach 2021-04-19T11:49:50+00:00 https://informationsecuritybuzz.com/expert-comments/facebook-facing-mass-legal-action-over-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2665583 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite Expert Comment On DPC Facebook Investigation 2021-04-16T14:40:38+00:00 https://informationsecuritybuzz.com/expert-comments/expert-comment-on-dpc-facebook-investigation/ www.secnews.physaphae.fr/article.php?IdArticle=2653375 False Data Breach None None SecureMac - Security focused on MAC Checklist 226: Yet Another Facebook Data Breach 2021-04-16T09:04:12+00:00 https://www.securemac.com/checklist/checklist-226-yet-another-facebook-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2651738 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Arrest Made Over California City Data Breach 2021-04-15T15:45:00+00:00 https://www.infosecurity-magazine.com:443/news/arrest-made-over-californian-city/ www.secnews.physaphae.fr/article.php?IdArticle=2647570 False Data Breach None None Security Intelligence - Site de news Américain Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach 2021-04-13T11:00:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/RkgLoyzSQ8A/ www.secnews.physaphae.fr/article.php?IdArticle=2630386 False Data Breach None None Troy Hunt - Blog Data Breaches, Class Actions and Ambulance Chasing the LOQBOX data breach from 2020. Their message began as follows:I am currently in the process of claiming compensation for a severe data breach]]> 2021-04-13T05:29:43+00:00 https://www.troyhunt.com/data-breaches-class-actions-and-ambulance-chasing/ www.secnews.physaphae.fr/article.php?IdArticle=2629113 False Data Breach None None Security Affairs - Blog Secu LinkedIn confirmed that it was not a victim of a data breach 2021-04-12T09:48:37+00:00 https://securityaffairs.co/wordpress/116689/data-breach/linkedin-not-data-breach.html?utm_source=rss&utm_medium=rss&utm_campaign=linkedin-not-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2623716 False Data Breach None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users\' Data ]]> 2021-04-12T09:04:02+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/7qeEyWoS1pM/indian-brokerage-firm-upstox-suffers.html www.secnews.physaphae.fr/article.php?IdArticle=2625678 False Data Breach None None Security Intelligence - Site de news Américain How Vulnerability Management Can Stop a Data Breach 2021-04-08T16:30:00+00:00 http://feedproxy.google.com/~r/SecurityIntelligence/~3/GNmhQX7eV1s/ www.secnews.physaphae.fr/article.php?IdArticle=2606341 False Data Breach,Vulnerability None None SecurityWeek - Security News Belden Says Health-Related Information Exposed in Data Breach data breach disclosed in November 2020, and said health-related information was also exposed. ]]> 2021-04-08T14:19:27+00:00 http://feedproxy.google.com/~r/Securityweek/~3/EmCDx1i1c9s/belden-says-health-related-information-exposed-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2605009 False Data Breach None None We Live Security - Editeur Logiciel Antivirus ESET Does data stolen in a data breach expire? 2021-04-08T13:00:15+00:00 http://feedproxy.google.com/~r/eset/blog/~3/coJBwR5fSPw/ www.secnews.physaphae.fr/article.php?IdArticle=2611308 False Data Breach None None IT Security Guru - Blog Sécurité Carding Mafia hack: 300,000 user accounts exposed 2021-04-08T12:09:33+00:00 https://www.itsecurityguru.org/2021/04/08/carding-mafia-hack-300000-user-accounts-exposed/?utm_source=rss&utm_medium=rss&utm_campaign=carding-mafia-hack-300000-user-accounts-exposed www.secnews.physaphae.fr/article.php?IdArticle=2604702 False Data Breach None None Naked Security - Blog sophos S3 Ep27: Census scammers, beg bounties and data breach fines [Podcast] 2021-04-08T10:46:54+00:00 https://nakedsecurity.sophos.com/2021/04/08/s3-ep27-census-scammers-beg-bounties-and-data-breach-fines-podcast/ www.secnews.physaphae.fr/article.php?IdArticle=2603760 False Data Breach None None SecureMac - Security focused on MAC Facebook data breach exposes details of 500 million users 2021-04-07T22:40:40+00:00 https://www.securemac.com/news/facebook-data-breach-exposes-details-of-500-million-users www.secnews.physaphae.fr/article.php?IdArticle=2601734 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Consulting Firm Data Breach Impacts MSU 2021-04-07T16:25:00+00:00 https://www.infosecurity-magazine.com:443/news/consulting-firm-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2600396 False Ransomware,Data Breach None None Naked Security - Blog sophos Too slow! Booking.com fined for not reporting data breach fast enough 2021-04-06T22:22:58+00:00 https://nakedsecurity.sophos.com/2021/04/06/too-slow-booking-com-fined-for-not-reporting-data-breach-fast-enough/ www.secnews.physaphae.fr/article.php?IdArticle=2596029 False Data Breach None None Bleeping Computer - Magazine Américain Have I Been Pwned adds search for leaked Facebook phone numbers 2021-04-06T13:50:58+00:00 https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-search-for-leaked-facebook-phone-numbers/ www.secnews.physaphae.fr/article.php?IdArticle=2594232 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite Experts Insight On Facebook Data Leak 2021-04-06T10:38:26+00:00 https://informationsecuritybuzz.com/expert-comments/experts-insight-on-facebook-data-leak/ www.secnews.physaphae.fr/article.php?IdArticle=2591828 False Data Breach None None Security Affairs - Blog Secu 2,5M+ users can check whether their data were exposed in Facebook data leak 2021-04-05T15:19:42+00:00 https://securityaffairs.co/wordpress/116371/data-breach/facebook-leak-check.html?utm_source=rss&utm_medium=rss&utm_campaign=facebook-leak-check www.secnews.physaphae.fr/article.php?IdArticle=2589326 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite Expert Insight: Arup\'s Data Breach 2021-04-05T15:09:20+00:00 https://informationsecuritybuzz.com/expert-comments/expert-insight-arups-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2589267 False Data Breach,Guideline None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) How the Work-From-Home Shift Impacts SaaS Security ]]> 2021-04-05T07:52:56+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/wHKqS9VD5z0/how-work-from-home-shift-impacts-saas.html www.secnews.physaphae.fr/article.php?IdArticle=2589139 False Data Breach None None Bleeping Computer - Magazine Américain How to check if your info was exposed in the Facebook data leak 2021-04-04T14:28:25+00:00 https://www.bleepingcomputer.com/news/security/how-to-check-if-your-info-was-exposed-in-the-facebook-data-leak/ www.secnews.physaphae.fr/article.php?IdArticle=2585181 False Data Breach None None Security Affairs - Blog Secu Capital One discovered more customers\' SSNs exposed in 2019 hack 2021-04-03T16:51:01+00:00 https://securityaffairs.co/wordpress/116309/data-breach/capital-one-ssns.html?utm_source=rss&utm_medium=rss&utm_campaign=capital-one-ssns www.secnews.physaphae.fr/article.php?IdArticle=2581510 True Data Breach,Hack None None Bleeping Computer - Magazine Américain Capital One notifies more clients of SSNs exposed in 2019 data breach 2021-04-02T11:46:15+00:00 https://www.bleepingcomputer.com/news/security/capital-one-notifies-more-clients-of-ssns-exposed-in-2019-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2576585 False Data Breach None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC 5 steps to respond to a data breach variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this planning includes how to prevent them. But to execute a logical, effective response, keep reading. In this guide, I’ll take you through a methodical process of handling a data breach and how to stop it from happening again. Let’s get to it. 1. Stop the breach At the risk of resembling Captain Obvious, before anything else you need to stop the data leak. But to do that you have to recognize a data breach exists. For some organizations the problem with data breaches isn’t responding to them – it’s knowing they are happening at all. Research indicates that breach detection can take half a year or longer on average. That should be a mind-boggling statistic and testament to the general widespread lack of effective cybersecurity. By the time the problem is spotted, potentially private data has been leaking into the wrong hands for a long time. So... contain it quickly. Isolate the systems that have been compromised and immediately take them offline. Late though it might be, it’s critical to stop the problem from spreading to other parts of your network. Shut down any user accounts that you believe have been used to steal data – it’s better to be safe than sorry. You can restore them later. 2. Assess the damage Next, get ready to undertake some forensics. These should be focused not just on tracing how your data was accessed, but the likely impact of it being released to the general public, in the unfortunate event that happens. While determining whether it’s a data breach, leak, or compromise, you should also ask yourself (and your team) a number of questions: What was the attack vector? Was the attack based on social-engineering tactics or through user accounts? How sensitive is the breached data? What is the type of data affected? Does the data contain high-risk information? Was the data encrypted and can it be restored (did the company backup their data)? It’s crucial that you perform this analysis before going on to the next step. Otherwise, your response to the breach could look uninformed and casual to an outsider. Get the facts straight, in other words, before customers start asking awkward questions. 3. Notify those affected Then it’s time to come clean. Inform everyone who is likely to be affected by the breach at the earliest possible opportunity. While it’s not a terrible idea to make sure your systems are safe before breaking the news, that doesn’t give you a license to wait months “just in case.” It’s tempting to play down the breach. Maybe omit some damaging details in hopes of preserving your brand integrity. Unthink those thoughts! If you are not totally honest and it’s discovered later - which it almost certainly will be - brand damage could be much, much worse. There is also the possibility of legal action. Any nasty, negative online comments the breach gen]]> 2021-04-02T10:00:00+00:00 https://feeds.feedblitz.com/~/648187946/0/alienvault-blogs~steps-to-respond-to-a-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2575099 False Data Breach,Hack None None InfoSecurity Mag - InfoSecurity Magazine Forensic Audit of MobiKwik Ordered 2021-04-01T17:05:00+00:00 https://www.infosecurity-magazine.com:443/news/forensic-audit-of-mobikwik-ordered/ www.secnews.physaphae.fr/article.php?IdArticle=2572290 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite Whistle-blower Claims Ubiquiti Networks Data Breach Was \'catastrophic\' 2021-04-01T16:53:01+00:00 https://informationsecuritybuzz.com/expert-comments/whistle-blower-claims-ubiquiti-networks-data-breach-was-catastrophic/ www.secnews.physaphae.fr/article.php?IdArticle=2571897 False Data Breach None None SecurityWeek - Security News Ubiquiti Shares Dive After Reportedly Downplaying \'Catastrophic\' Data Breach UI) fell significantly this week following a report claiming that the recently disclosed data breach was “catastrophic” and that its impact was downplayed. ]]> 2021-04-01T14:30:21+00:00 http://feedproxy.google.com/~r/Securityweek/~3/6Fh-JNeuyDc/ubiquiti-shares-dive-following-report-it-downplayed-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2571402 False Data Breach None None IT Security Guru - Blog Sécurité Ubiquiti: cyberattack worse than originally reported 2021-04-01T11:27:15+00:00 https://www.itsecurityguru.org/2021/04/01/ubiquiti-cyberattack-worse-than-originally-reported/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-cyberattack-worse-than-originally-reported www.secnews.physaphae.fr/article.php?IdArticle=2571030 True Data Breach None None Security Affairs - Blog Secu Ubiquiti security breach may be a catastrophe 2021-04-01T09:58:40+00:00 https://securityaffairs.co/wordpress/116196/data-breach/ubiquiti-security-breach.html?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-security-breach www.secnews.physaphae.fr/article.php?IdArticle=2570358 False Data Breach None None Bleeping Computer - Magazine Américain Ubiquiti cyberattack may be far worse than originally disclosed 2021-04-01T03:04:05+00:00 https://www.bleepingcomputer.com/news/security/ubiquiti-cyberattack-may-be-far-worse-than-originally-disclosed/ www.secnews.physaphae.fr/article.php?IdArticle=2570047 False Data Breach None None CybeReason - Vendor blog Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach A security professional who assisted Ubiquiti in its response to a data breach accused the Internet-of-Things (IoT) device vendor of having downplayed the incident's severity.]]> 2021-03-31T19:10:25+00:00 https://www.cybereason.com/blog/whistleblower-accuses-ubiquiti-of-downplaying-major-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2568096 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite MobiKwik Data Breach – Thoughts From Experts 2021-03-31T12:02:40+00:00 https://informationsecuritybuzz.com/expert-comments/mobikwik-data-breach-thoughts-from-experts/ www.secnews.physaphae.fr/article.php?IdArticle=2566015 False Data Breach None None ZD Net - Magazine Info Whistleblower claims Ubiquiti Networks data breach was \'catastrophic\' 2021-03-31T07:38:24+00:00 https://www.zdnet.com/article/whistleblower-claims-ubiquiti-networks-data-breach-was-catastrophic/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=2565416 False Data Breach None None Bleeping Computer - Magazine Américain Leading Indian fintech platform MobiKwik denies data breach 2021-03-30T11:20:35+00:00 https://www.bleepingcomputer.com/news/security/leading-indian-fintech-platform-mobikwik-denies-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=2562158 False Data Breach None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) MobiKwik Suffers Major Breach - KYC Data of 3.5 Million Users Exposed ]]> 2021-03-29T23:21:45+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/1WeIZsd2S4g/mobikwik-suffers-major-breach-kyc-data.html www.secnews.physaphae.fr/article.php?IdArticle=2559979 False Data Breach None None InformationSecurityBuzzNews - Site de News Securite 300,000 User Accounts Exposed After Credit Card Hacking Forum Is Hacked 2021-03-29T11:30:14+00:00 https://informationsecuritybuzz.com/expert-comments/300000-user-accounts-exposed-after-credit-card-hacking-forum-is-hacked/ www.secnews.physaphae.fr/article.php?IdArticle=2555387 False Data Breach None 2.0000000000000000 Bleeping Computer - Magazine Américain FatFace sends controversial data breach email after ransomware attack 2021-03-27T09:41:12+00:00 https://www.bleepingcomputer.com/news/security/fatface-sends-controversial-data-breach-email-after-ransomware-attack/ www.secnews.physaphae.fr/article.php?IdArticle=2544686 False Ransomware,Data Breach None None SecurityWeek - Security News Report: US Gov Executive Order to Mandate Data Breach Disclosure Reuters news report. ]]> 2021-03-26T16:54:13+00:00 http://feedproxy.google.com/~r/Securityweek/~3/7xEDwn0CS9Y/report-us-gov-executive-order-mandate-data-breach-disclosure www.secnews.physaphae.fr/article.php?IdArticle=2538744 False Data Breach None None Security Affairs - Blog Secu 30 million Americans affected by the Astoria Company data breach 2021-03-25T13:38:55+00:00 https://securityaffairs.co/wordpress/115934/breaking-news/astoria-company-data-leak.html?utm_source=rss&utm_medium=rss&utm_campaign=astoria-company-data-leak www.secnews.physaphae.fr/article.php?IdArticle=2531955 False Data Breach,Guideline None None Graham Cluley - Blog Security FatFace would like everyone to keep its data breach “strictly private and confidential” 2021-03-25T12:54:46+00:00 https://grahamcluley.com/fatface-would-like-everyone-to-keep-its-data-breach-strictly-private-and-confidential/ www.secnews.physaphae.fr/article.php?IdArticle=2531453 False Data Breach None None SecurityWeek - Security News Air Charter Firm Solairus Aviation Suffers Data Breach 2021-03-24T17:54:24+00:00 http://feedproxy.google.com/~r/Securityweek/~3/dMOfIoPM-nY/air-charter-firm-solairus-aviation-suffers-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2527945 False Data Breach None 2.0000000000000000 IT Security Guru - Blog Sécurité California Controller\'s Office employee falls for phishing link 2021-03-24T11:13:16+00:00 https://www.itsecurityguru.org/2021/03/24/california-controllers-office-employee-falls-for-phishing-link/?utm_source=rss&utm_medium=rss&utm_campaign=california-controllers-office-employee-falls-for-phishing-link www.secnews.physaphae.fr/article.php?IdArticle=2526640 False Data Breach,Guideline None None ZD Net - Magazine Info Oil giant Shell discloses data breach linked to Accellion FTA vulnerability 2021-03-23T11:36:21+00:00 https://www.zdnet.com/article/oil-giant-shell-discloses-data-breach-linked-to-accellion-fta-vulnerability/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=2521819 False Data Breach,Vulnerability None None IT Security Guru - Blog Sécurité Michigan Bank loses Customers\' SNNs 2021-03-23T11:01:27+00:00 https://www.itsecurityguru.org/2021/03/23/michigan-bank-loses-customers-snns/?utm_source=rss&utm_medium=rss&utm_campaign=michigan-bank-loses-customers-snns www.secnews.physaphae.fr/article.php?IdArticle=2521618 False Data Breach None None Security Affairs - Blog Secu Energy giant Shell discloses data breach caused by Accellion FTA hack 2021-03-23T09:06:06+00:00 https://securityaffairs.co/wordpress/115869/cyber-crime/shell-accellion-fta-attack.html?utm_source=rss&utm_medium=rss&utm_campaign=shell-accellion-fta-attack www.secnews.physaphae.fr/article.php?IdArticle=2521166 False Data Breach,Hack None None Bleeping Computer - Magazine Américain Energy giant Shell discloses data breach after Accellion hack 2021-03-22T10:58:16+00:00 https://www.bleepingcomputer.com/news/security/energy-giant-shell-discloses-data-breach-after-accellion-hack/ www.secnews.physaphae.fr/article.php?IdArticle=2517533 False Data Breach,Hack None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC What is a security operations center (SOC)? Explaining the SOC framework The average cost of a data breach is approximately $3.92M On average, it takes 280 days to identify and contain a breach If your company doesn’t have a security operations center (SOC), it may be time to change that. In fact, a recent study indicates 86% of organizations rate the SOC as anywhere from important to essential to an organization's cybersecurity strategy. What is a SOC? The security operations center (SOC) identifies, investigates, prioritizes, and resolves issues that could affect the security of an organization’s critical infrastructure and data. A well-developed and well-run SOC performs real-time threat detection and incident response, allowing SOC analysts to rapidly deliver security intelligence to stakeholders and senior management. The SOC framework was introduced by The Open Web Application Security Project (OWASP), a nonprofit foundation established to improve software security as a means for responding to cybersecurity incidents. The framework includes technical controls (Security Information and Events Management (SIEM) systems), organizational controls (processes), and also includes a human component (detection and response). Perhaps the most crucial function for a SOC involves a detailed and ongoing attack analysis. This means gathering and reporting on attack data that provides answers to these questions: When did the attack start? Who is behind the attack? How is the attack being carried out? What resources, systems, or data are at risk of being compromised or have already been compromised? A proactive and reactive mechanism Beyond attack analysis, the SOC also provides critical cybersecurity functions that should be a cornerstone for every business today: prevention, detection and response. An effective SOC prioritizes a proactive approach rather than relying on reactive measures. The SOC typically works around the clock to monitor the network for abnormal or malicious activity, which might stop attacks before they happen. How does this work? SOC analysts are well-equipped to prevent threats because they have access to comprehensive network data and possess up-to-date intel on global threat intelligence stats and data covering the latest hacker tools, trends, and methodologies. When it comes to response, think of the SOC as a first responder, carrying out the critical actions that “stop the bleeding” from an attack. When the incident is over, the SOC will also assist or lead restoration and recovery processes. What are the goals of a well-functioning SOC? A well-functioning SOC provides a multitude of benefits, but in order to get the most out of your security operations center, you’ll need to ensure you have experienced personnel to make u]]> 2021-03-18T11:01:00+00:00 https://feeds.feedblitz.com/~/647021824/0/alienvault-blogs~What-is-a-security-operations-center-SOC-Explaining-the-SOC-framework www.secnews.physaphae.fr/article.php?IdArticle=2499469 False Data Breach,Threat,Guideline None None IT Security Guru - Blog Sécurité Defunct WeLeakInfo site suffered own data breach 2021-03-17T10:53:39+00:00 https://www.itsecurityguru.org/2021/03/17/defunct-weleakinfo-site-suffered-own-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=defunct-weleakinfo-site-suffered-own-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2494900 False Data Breach,Threat None None InfoSecurity Mag - InfoSecurity Magazine Fastway Couriers Confirms Security Breach 2021-03-16T17:49:00+00:00 https://www.infosecurity-magazine.com:443/news/fastway-couriers-confirms-security/ www.secnews.physaphae.fr/article.php?IdArticle=2491801 False Data Breach None None ComputerWeekly - Computer Magazine How attackers counter incident response after a data breach 2021-03-16T09:00:00+00:00 https://searchsecurity.techtarget.com/post/How-attackers-counter-incident-response-after-a-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2491088 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Vulnerable Australian Kids Impacted by Data Breach 2021-03-15T16:20:00+00:00 https://www.infosecurity-magazine.com:443/news/vulnerable-australian-kids/ www.secnews.physaphae.fr/article.php?IdArticle=2489970 False Data Breach None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC What is network segmentation? NS best practices, requirements explained Cost of a Data Breach Report, most respondents are concerned that identifying, containing, and paying for a data breach is more burdensome today than ever before. Seventy-one percent feel that remote work will increase the time to identify and contain a breach, while almost the same number believe remote work increases the cost of a breach. The numbers agree: remote work has added $137,000 to the average breach cost. In 2021 and beyond, reactive security measures—typically cumbersome and costly—are no longer sufficient. Instead, proactive strategies that anticipate potential risks or vulnerabilities and prevent them before they even happen are required. One such strategy, network segmentation, is critical for any organization. If you’re not deploying network segmentation, it’s time to get started. What is network segmentation? Network segmentation is a process in which your network is divided into multiple zones, with specific security protocols applied to each zone. The main goal of network segmentation is to have a better handle on managing security and compliance. Typically, traffic is segregated between network segments using VLANs (virtual local area networks), with firewalls representing an additional layer of security for application and data protection.  By separating your network into smaller networks, your organization’s devices, servers, and applications are isolated from the rest of the network. Potential attackers that successfully breach your first perimeter of defense cannot get further, as they remain contained within the network segment accessed. How does network segmentation compare to micro segmentation? The concept of micro segmentation was created to reduce an organization’s network attack surface by applying granular security controls at the workload level and limiting east-west communication. While micro segmentation began as a method of moderating lateral traffic between servers within one segment, it has evolved to incorporate traffic in multiple segments. This intra-segment traffic would allow communication between both servers and applications, as long as the requesting resource meets the permissions set out for that host/application/server/user. Microsegmentation can also be used at a device level. For example, protecting IoT or connected manufacturing or medical devices—since many ship without endpoint security or are difficult to take offline in order to update endpoint security. The key differences between the two strategies can be boiled down like this: Segmentation works with the physical network, policies are broad, limits north-south traffic at the network level, and is typically hardware-based Micro segmentation works with a virtual network, policies are more granular, limits east-west traffic at the workload level, and is typically software-based. An analogy: if your network is a collection of castles, segmentation is like the huge walls surrounding the buildings, while micro segmentation is like armed guards outside each castle door. When deciding between segmentation and micro segmentation, it shouldn’t be a question of one over the other. Incorporating both models into your security strategy is best: segmentation north-south traffic and micro segmentation for east-west traffic. Best practices for segmenting network traffic However you go about segmenting your network, you’ll want to ensure the seg]]> 2021-03-15T05:01:00+00:00 https://feeds.feedblitz.com/~/646680038/0/alienvault-blogs~What-is-network-segmentation-NS-best-practices-requirements-explained www.secnews.physaphae.fr/article.php?IdArticle=2484161 False Data Breach,Vulnerability,Guideline None None Security Affairs - Blog Secu 10,000+ WeLeakInfo customer records leaked 2021-03-12T20:57:04+00:00 https://securityaffairs.co/wordpress/115544/data-breach/weleakinfo-leaked-data.html?utm_source=rss&utm_medium=rss&utm_campaign=weleakinfo-leaked-data www.secnews.physaphae.fr/article.php?IdArticle=2476079 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Settlement Reached Over Data Breach Impacting 24 Million Americans 2021-03-12T17:48:00+00:00 https://www.infosecurity-magazine.com:443/news/settlement-reached-over-amca-data/ www.secnews.physaphae.fr/article.php?IdArticle=2474811 False Data Breach None None InfoSecurity Mag - InfoSecurity Magazine Utah Company Stored Passport Scans on Unsecured Server 2021-03-12T17:15:00+00:00 https://www.infosecurity-magazine.com:443/news/utah-company-unsecured-server/ www.secnews.physaphae.fr/article.php?IdArticle=2474812 False Data Breach None None IT Security Guru - Blog Sécurité West Ham supporters have data leaked by club website 2021-03-12T16:30:41+00:00 https://www.itsecurityguru.org/2021/03/12/west-ham-supporters-have-data-leaked-by-club-website/?utm_source=rss&utm_medium=rss&utm_campaign=west-ham-supporters-have-data-leaked-by-club-website www.secnews.physaphae.fr/article.php?IdArticle=2474729 True Data Breach None None