Vous êtes ici :   Accueil » RSS - net-security.org
 
Prévisualiser...  Imprimer...  Imprimer la page...
!Introduction
Technique
Outils
Base de connaissances
Visites

 1563381 visiteurs

 8 visiteurs en ligne

Contact

Notre site
griessenconsulting-Tag-Qrcode.png

info@griessenconsulting.ch

ch.linkedin.com/in/thierrygriessenCISA

Neuchâtel, Suisse


Mes coordonées
griessenconsulting-Tag-Vcard-OK.png

Crée votre Code

RSS - net-security.org

Help Net Security


Daily information security news with a focus on enterprise security.


Office 365 users targeted by phishers employing simple HTML tricks  Voir?

Phishers are using a simple but effective trick to fool Microsoft’s NLP-based anti-phishing protections and Office 365 users into entering their login credentials into spoofed login pages. The phishing emails landing in targets’ inboxes warn potential victims that their email account has reached a “maximum quota limit” and that they should upgrade their account. To the casual observer, the emails appear to be “signed” by Microsoft. The fact that they are not sent from an … More

The post Office 365 users targeted by phishers employing simple HTML tricks appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 17:39)

New infosec products of the week​: June 22, 2018  Voir?

ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize enterprise security operations with critical asset behavior analysis that instantly surfaces the highest-risk threats, even those hiding within encrypted traffic. With this insight, security operations teams can zero in on critical threat patterns and investigate down to the root cause in seconds, not days. Twistlock now secures tasks running in AWS Lambda, Google Cloud … More

The post New infosec products of the week​: June 22, 2018 appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 15:07)

Why cybercriminals are turning to cryptojacking for easy money  Voir?

The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017. Although the price has since tumbled and attitudes to crypto in general have calmed it is still seen as valuable venture amongst investors and consumers alike. Unsurprisingly, this interest extends to cyber criminals, who are always ready to sniff out potential new methods of making cash quickly … More

The post Why cybercriminals are turning to cryptojacking for easy money appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 14:00)

Banking Trojans and cryptojacking on the rise  Voir?

A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well as from in-depth investigations conducted by the Morphisec Labs threat research team. The report reveals key trends and definitive changes in the attack landscape for a 90-day span, with technical details on specific attack techniques and tactics used, including a highly unique set of threat analyses on five of the most critical … More

The post Banking Trojans and cryptojacking on the rise appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 13:45)

Unrestricted access to systems and files exposes organizations to cybercrime  Voir?

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five having to request permission to access specific files. Less than half (43%) are restricted to accessing only the files that are relevant to their work. This is according to a study into attitudes to cybersecurity among the next generation workforce, commissioned by Centrify. The study, conducted by … More

The post Unrestricted access to systems and files exposes organizations to cybercrime appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 13:30)

Cylance announced CylanceHYBRID and CylanceON-PREM  Voir?

Cylance announced the availability of CylanceHYBRID and CylanceON-PREM, two deployment and management options for CylancePROTECT. Cylance’s endpoint security product now serves any environment: public cloud, private cloud and air-gapped networks. Nearly two-thirds of enterprise computing still occurs in on-premises data centers, and 90 percent of organizations will adopt hybrid strategies by 2020. Organizations with closed networks, private clouds or limited connectivity face the problem of protecting against both outside and inside threats without exposing their … More

The post Cylance announced CylanceHYBRID and CylanceON-PREM appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 12:00)

Syniverse launches global private network  Voir?

Syniverse announced the launch of Syniverse Secure Global Access, a private, secure, global network that provides the foundation for businesses to reliably safeguard mission-critical data in the age of digital transformation. At the time of launch, more than five multinational businesses are already using Syniverse Secure Global Access to securely connect to the evolving mobile ecosystem and to safeguard vital business transactions like those needed to support the internet of things (IoT). “While the public … More

The post Syniverse launches global private network appeared first on Help Net Security.

... / ... Lire la suite

(22/06/2018 @ 00:42)

Cisco plugs critical flaws in many switches, security appliances  Voir?

Cisco has released security updates to address a bucketload of vulnerabilities affecting multiple products, including 24 critical and high-severity flaws found in many of its switches, next generation firewalls and security appliances. Those vulnerabilities are present in the Cisco NX-OS Software, which enables network automation and programmatical provisioning and configuration of the devices via APIs, and Cisco FXOS (Firepower eXtensible Operating System). “Successful exploitation of the vulnerabilities could allow an attacker to gain unauthorized access … More

The post Cisco plugs critical flaws in many switches, security appliances appeared first on Help Net Security.

... / ... Lire la suite

(21/06/2018 @ 18:37)

Threat modeling: What’s all the buzz about?  Voir?

Keen observers will have noted an uptick in activity around threat modeling within the information security community recently with new tools being released and strategies and methodologies being discussed on social media; culminating in a week-long threat modeling track at the Open Security Summit (formally OWASP Summit). What is threat modeling? In order to answer this question I will refer to the recently updated OWASP application threat modeling page: Threat modelling works to identify, communicate, … More

The post Threat modeling: What’s all the buzz about? appeared first on Help Net Security.

... / ... Lire la suite

(21/06/2018 @ 14:00)

Could an Equifax-sized data breach happen again?  Voir?

Many global financial services organizations are targeted by sophisticated cyberattackers in an attempt to steal critical data and personally-identifiable information (PII), according to Vectra. Financial industry attacker behaviors per 10,000 devices Vectra disclosed that cyberattackers build hidden tunnels to break into networks and steal information. These tunnels are used to remotely control an attack, known as command-and-control, and steal data, known as exfiltration, while remaining largely undetected. Security breaches across multiple industries continue in an … More

The post Could an Equifax-sized data breach happen again? appeared first on Help Net Security.

... / ... Lire la suite

(21/06/2018 @ 13:45)

Dernière mise à jour : 22/06/2018 @ 22:05