Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

NIS2 : comment les équipes IT peuvent éliminer les angles morts de leurs réseaux dans les temps

La directive NIS2 vise à renforcer de manière significative la cybersécurité et la sécurité de l’information dans toute l’Union européenne (UE), en atténuant les menaces pesant sur les réseaux et les systèmes d’information dans des secteurs clés (secteurs d’activité d’importance vitale) tout en assurant la continuité de ces services en cas d’incidents. Son objectif est de […]

The post NIS2 : comment les équipes IT peuvent éliminer les angles morts de leurs réseaux dans les temps first appeared on UnderNews.

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives  Analysts

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project's logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been

Est-il légal d’utiliser un VPN en France ?

Les réseaux privés virtuels (VPN) jouissent d'une notoriété croissante, mais il existe des usages en ligne qui ne sont pas neutres. Certaines activités peuvent ainsi avoir des répercussions judiciaires. L'occasion de faire le point sur le cadre légal des VPN en France.

❌