Cybersécurité : Qevlar AI lève 14 millions de dollars pour sa solution automatisée d'investigation
La start-up tricolore déploie plusieurs agents capables d'automatiser une partie du travail des analystes dans les centres d'opérations de...-Cybersécurité
Year in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
From Talos' 2024 Year in Review, here are some findings from the top targeted network device vulnerabilities. We also explore how threat actors are moving away from time sensitive lures in their emails. And finally we reveal the tools that adversaries most heavily utilized last year.
Learn what third-party risk management (TPRM) entails, what staff augmentation is, and how to decide whether it’s the right solution for your TPRM needs.
At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically. This has greatly expanded the “attack surface” that must be defended to prevent unauthorized wiretaps, especially at scale. The job of the illegal eavesdropper has gotten significantly easier, with many more options and opportunities for them to exploit. Compromising our telecommunications infrastructure is now little different from performing any other kind of computer intrusion or data breach, a well-known and endemic cybersecurity problem. To put it bluntly, something like Salt Typhoon was inevitable, and will likely happen again unless significant changes are made...
"Nous sommes le Rafale de la cybersécurité", Grégoire Germain, CEO d'HarfangLab
A l'occasion du Forum InCyber, L'Usine Digitale a eu l'occasion d'échanger avec Grégoire Germain, le CEO et co-fondateur d'HarfangLab, une...-Cybersécurité
Google addresses 2 actively exploited vulnerabilities in security update | CyberScoop
Serbian security services exploited one of the actively exploited vulnerabilities to break into the phone of a youth activist in Serbia, according to Amnesty International.
EncryptHub's dual life: Cybercriminal vs Windows bug-bounty researcher
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research.
Microsoft delays WSUS driver sync deprecation indefinitely
Microsoft announced today that, based on customer feedback, it will indefinitely delay removing driver synchronization in Windows Server Update Services (WSUS).