Voici le rapport de veille de la semaine faisant le tour des actualités les plus intéressantes. Certaines d’entre elles seront développées dans les prochains articles. Bonne lecture et Merci pour le café !
Leading French cybersecurity company StormShield disclosed that their systems were hacked, allowing a threat actor to access the company’s support ticket system and steal source code for Stormshield Network Security firewall software. StormShield is a French cybersecurity firm that develops UTM (Unified Threat Management) firewall devices, endpoint protection solutions, and secure file management solutions.
The Chinese government may have stolen personal data from 80% of adults in the United States, according to a 60 Minutes report that aired yesterday on American television and radio network CBS. In the report, former director of the US National Counterintelligence and Security Center, Bill Evanina, warned that the PRC is actively working to gather and exploit Americans’ DNA and other health information.
Le botnet Trickbot qui avait servi aux attaques Ryuk et d’autres ransomware a repris du service. Pour ce retour, les pirates ont remplacé les pièces jointes malveillantes des courriers électroniques par des liens malveillants. Il cible particulièrement les cabinets d’avocats et les compagnies d’assurance.
Google has addressed an actively exploited zero-day security vulnerability in the Chrome 88.0.4324.150 version released today, February 4th, 2020, to the Stable desktop channel for Windows, Mac, and Linux users. « Google is aware of reports that an exploit for CVE-2021-21148 exists in the wild, » the Google Chrome 88.0.4324.150 announcement reads.
Depuis plusieurs mois, les États-Unis font face à une cyberattaque d’une ampleur inédite causée en grande partie à cause d’une faille de sécurité dans le logiciel Orion de SolarWinds. Il …
This article is more than 2 years old « Do you want to speak to a manager Karen? » Karen Banks from Swadlincote in South Derbyshire, England, isn’t very happy with whoever managed to post this message on an electronic traffic information sign in the neighbouring town of Burton. GO BACK TO SWAD YOU IDIOTS.
IT security practitioners spend a lot of time strategizing ransomware defense, but many know little about the criminals plotting attacks. Who is the person behind a devastating ransomware campaign? Why did they choose a specific target? What about cybercrime appeals to them? To better understand the attacker’s perspective, Cisco Talos researchers interviewed a LockBit ransomware operator.
« I do not like to work in the US because getting paid is harder there, the EU pays better and more, » Aleks reportedly told researchers.