• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From bleepingcomputer.com

Vodka maker Stoli files for bankruptcy in US after ransomware attack

19 19

Stoli Group's U.S. companies have filed for bankruptcy following an August ransomware attack and Russian authorities seizing the company's remaining distilleries in the country.

#us #News #cysec #Russia #ceptbiro #distilleries #ransomwareattack #Ransomware #bankruptcy #cybersecurity

20h ago

From bbc.com

Telegram U-turns and joins global child safety scheme

15 15

It is the latest in a series of changes announced by the platform since its founder Pavel Durov was arrested.

#law #tech #autosum #bbcnews #infosec #ceptbiro #security #telegram #legaltech #ycombinator

13h ago

From sans.edu

Data Analysis: The Unsung Hero of Cybersecurity Expertise [Guest Diary] - SANS Internet Storm Center

3 3

Data Analysis: The Unsung Hero of Cybersecurity Expertise [Guest Diary], Author: Guy Bruneau

#infosec #ceptbiro #security #dataanalysis #cybersecurity

17h ago

From cybersecuritynews.com

Cloudflare Developer Domains Abused For Cyber Attacks

2 2

Cloudflare developer domains are actively abused by the threat actors for several illicit malicious purposes, as reported by FORTRA analysts.

#infosec #threats #ceptbiro #security #cloudflare #cyberattack #cyberattacks #cybersecurity #developerdomains #CyberSecurityNews

7h ago

From any.run

Search Operators and Wildcards for Cyber Threat Investigations - ANY.RUN's Cybersecurity Blog

2 2

Learn how to use wildcards and operators in TI Lookup to create effective search queries for collecting intelligence on cyber threats.

#infosec #ceptbiro #security #wildcards #cybersecurity #searchoperators #cyberthreatinvestigations

7h ago

From gbhackers.com

Progress WhatsUp Gold RCE Vulnerability - PoC Exploit Released

2 2

A registry overwrite remote code execution (RCE) vulnerability has been identified in NmAPI.exe, part of the WhatsUp Gold network monitoring software.

#poc #rce #infosec #ceptbiro #security #exploitreleased #CyberSecurityNews #progresswhatsupgold #cybersecurity #vulnerability

9h ago

From helpnetsecurity.com

Elastic expands cloud detection and response capabilities from a single SIEM - Help Net Security

2 2

Elastic Security now offers expanded cloud detection and response (CDR) capabilities from a single SIEM to reduce tool fragmentation.

#siem #infosec #ceptbiro #security #industrynews #cybersecurity #clouddetection #responsecapabilities #elastic

9h ago

From helpnetsecurity.com

Veza Access Requests reduces the risk of identity-based threats - Help Net Security

2 2

Veza Access Requests reduces the risk of identity-based threats with automated access policy intelligence for application access.

#risk #veza #infosec #ceptbiro #security #industrynews #cybersecurity #vezaaccessrequests #identitybasedthreats

9h ago

From cybersecuritynews.com

Google Chrome Type Confusion Vulnerability Let Attackers Execute Remote Code

2 2

A high-severity type confusion vulnerability in the V8 JavaScript engine of Google Chrome was recently discovered by independent researchers

#infosec #ceptbiro #security #googlechrome #cybersecurity #vulnerability #CyberSecurityNews

10h ago

From gbhackers.com

MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts

2 2

A critical vulnerability has been identified in the Mobile Security Framework (MobSF) that allows attackers to inject malicious scripts into the system.

#cve #xss #mobsf #infosec #ceptbiro #security #maliciousscripts #CyberSecurityNews #cybersecurity #vulnerability

10h ago

From helpnetsecurity.com

42Gears SureAccess secures organizations from unauthorized access - Help Net Security

2 2

42Gears SureAccess is designed to protect organizations from unauthorized access, data breaches, and insider threats.

#infosec #ceptbiro #security #sureaccess #industrynews #cybersecurity #unauthorizedaccess #42gears

10h ago

From cybersecuritynews.com

CISA Releases Guidance For Network Monitoring to Detect Malicious Cyber Actors

2 2

CISA in collaboration with the NSA, FBI, and international partners, has released crucial guidance for monitoring networks.

#cisa #infosec #ceptbiro #guidance #security #CyberSecurityNews #networkmonitoring #maliciouscyberactors #cybersecurity

14h ago

From cybersecuritynews.com

Veeam Service Provider RCE Vulnerability Let Attackers Execute Arbitrary Code

2 2

Veeam, a leading provider of backup and disaster recovery solutions, has disclosed two significant vulnerabilities affecting its Service Provider Console (VSPC), including a critical remote code execution (RCE) flaw.

#rce #infosec #ceptbiro #security #cybernews #CyberSecurityNews #computersecuritynews #executearbitrarycode #veeamserviceprovider #cybersecurity

15h ago

From cybersecuritynews.com

Authorities Dismantle MATRIX Secret Chat Service Used by Cybercriminals

2 2

A joint investigation team (JIT) involving French and Dutch authorities, with support from Eurojust and Europol, has successfully dismantled an encrypted messaging service known as MATRIX.

#matrix #infosec #ceptbiro #security #Authorities #cybercriminals #cybernewsreport #CyberSecurityNews #secretchatservice #computersecuritynews

15h ago

From theregister.com

How AWS is leaning into AI with chips, code, models

2 2

Cloud colossus reckons it can clarify hallucinations, get your apps off Microsoft's OS at pleasing speed

#AI #aws #infosec #ceptbiro #security #cybersecurity

17h ago

From wired.com

OpenAI Poaches 3 Top Engineers From DeepMind

2 2

The new hires, all experts in computer vision, are the latest AI researchers to jump to a direct competitor in an intensively competitive talent market.

#openai #infosec #ceptbiro #deepmind #security #cybersecurity

17h ago

From presse-citron.net

Apple écrase la concurrence sur le segment premium des smartphones

1 1

Quand même un iPhone 14 bat un Galaxy S24, c’est que la pomme est vraiment croquante !

#Apple #infosec #ceptbiro #security #Smartphones #cybersecurity

3h ago

From lemondeinformatique.fr

AWS dévoile sa famille de LLM mutimodal Nova - Le Monde Informatique

1 1

Amazon Web Services a dévoilé Nova Micro, Lite, Pro et Premier, des grands modèles de langage respectivement orientés sur le texte, l'image la vidéo...

#aws #infosec #ceptbiro #security #cybersecurity #llmmutimodalnova

3h ago

From lemondeinformatique.fr

Les puces personnalisées se multiplient chez les hyperscalers - Le Monde Informatique

1 1

Face à la pénurie de GPU, les fournisseurs de cloud se tournent de plus en plus vers des puces personnalisées pour traiter des charges de travail...

#infosec #ceptbiro #security #hyperscalers #cybersecurity #pucespersonnalisees

3h ago

From zdnet.fr

Amazon Web Services dévoile la puce Trainium3 et le projet Rainier - ZDNET

1 1

Le projet Rainier est un « UltraCluster » qui regroupera des centaines de milliers de puces Trainium.

#puce #infosec #rainier #ceptbiro #security #trainium3 #cybersecurity #AmazonWebServices

3h ago

From zdnet.fr

Après Encrochat et Sky ECC, la chute d’une nouvelle messagerie du crime, Matrix - ZDNET

1 1

Avec son homologue néerlandaise, la police française est à l’origine de l’opération d’interception des messages.

#matrix #infosec #ceptbiro #security #cybersecurity

4h ago

From lemondeinformatique.fr

SmokeLoader use d'anciens bugs Office pour mieux voler des données - Le Monde Informatique

1 1

Le chargeur de malware modulaire bien connu SmokeLoader exploite deux anciennes failles de la suite Office de Microsoft pour déployer des plugins...

#office #infosec #ceptbiro #security #SmokeLoader #cybersecurity #volerdesdonnees

4h ago

From radio-canada.ca

Des pirates obtiennent les données de plus de 7000 Saskatchewanais

1 1

Des pirates informatiques ont obtenu les informations médicales et personnelles de plus de 7000 personnes.

#infosec #pirates #ceptbiro #security #cybersecurity #saskatchewanais #donneesmedicales #donneespersonnelles

4h ago

From numerama.com

La police met fin à Matrix, l'application confidentielle des réseaux criminels

1 1

Les forces de police européennes, dont les autorités françaises, ont démantelé la messagerie Matrix, une application utilisée par de nombreuses organisations criminelles et réputée pour sa grande discrétion. Si son nom ne vous dit rien, c'est bon signe. La messagerie chiffrée Matrix a été...

#Police #matrix #infosec #ceptbiro #security #cybersecurity #reseauxcriminels #applicationconfidentielle

4h ago

From presse-citron.net

Amazon présente ses nouveaux modèles d’IA pour concurrencer ChatGPT et Gemini

1 1

Amazon dévoile une série de modèles d’intelligence artificielle pour les clients d’Amazon Web Services. De quoi faire de l’ombre à Google et OpenAI ?

#ia #amazon #gemini #chatgpt #infosec #ceptbiro #security #cybersecurity

4h ago

From securitymagazine.com

New phishing-as-a-service platform targets Microsoft 365

1 1

New phishing-as-a-service platform steals Microsoft 365 credentials via large-scale adversary-in-the-middle attacks.

#infosec #ceptbiro #security #Microsoft365 #cybersecurity #phishingasaserviceplatform

4h ago

From presse-citron.net

Pourquoi certains noms font-ils bugger ChatGPT ? (Non, ce n’est pas un complot)

1 1

Ce weekend, les internautes ont découvert que ChatGPT a des difficultés avec certains noms, comme “David Mayer". Cela a inspiré de nombreuses théories, mais OpenAI indique qu’il s’agit juste d’un bug.

#chatgpt #infosec #ceptbiro #security #cybersecurity

4h ago

From cybersecuritynews.com

MobSF Vulnerability Let Attackers Inject Malicious Scripts

1 1

A critical security flaw has been discovered in Mobile Security Framework (MobSF), a popular pen-testing and malware analysis tool.

#mobsf #infosec #ceptbiro #security #cybersecurity #vulnerability #injectmaliciousscripts

5h ago

From tripwire.com

Tripwire Patch Priority Index for November 2024

1 1

Stay updated with November's critical vulnerabilities. Prioritize patches for Windows, SQL Server, and Microsoft Defender to safeguard systems.

#infosec #ceptbiro #security #tripwire #cybersecurity

5h ago

From cyberguy.com

Malicious Play Store apps put 8 million Android users at risk - CyberGuy

1 1

A new report has revealed that over a dozen malicious apps containing SpyLoan malware have been available on the Play Store.

#apps #risk #infosec #ceptbiro #security #playstore #androidusers #cybersecurity

5h ago

From tripwire.com

CIS Control 10: Malware Defenses

1 1

Reinforce basic cybersecurity hygiene with essential safeguards for malware defenses. Learn how to secure your enterprise assets effectively.

#infosec #ceptbiro #security #ciscontrol10 #cybersecurity #malwaredefenses

5h ago

From siecledigital.fr

Comment l’informatique quantique va accélérer l'adoption des véhicules électriques et façonner l’avenir de la mobilité

1 1

La transition vers les véhicules électriques (VE) est essentielle pour réduire les émissions de carbone, et en Europe, 23,6 % des ventes de véhicules neufs l’an dernier étaient des VE ou hybrides rechargeables. Cependant, malgré les investissements du secteur automobile, des doutes persistent...

#infosec #ceptbiro #mobilite #security #cybersecurity #vehiculeselectriques #informatiquequantique

5h ago

From cybersecuritynews.com

PoC Exploit Released For Progress WhatsUp Gold Vulnerability

1 1

A critical security flaw in Progress WhatsUp Gold, a popular network monitoring tool, has been exposed with the release of a PoC exploit.

#poc #exploit #infosec #ceptbiro #security #cybersecurity #vulnerability #progresswhatsupgold

5h ago

From helpnetsecurity.com

Securing AI's new frontier: Visibility, governance, and mitigating compliance risks - Help Net Security

1 1

The tools, risks, and phases of the data and AI lifecycle, from curation to ops, make AI security a significant challenge for teams.

#infosec #ceptbiro #security #securingai #cybersecurity

5h ago

From it-connect.fr

Dark Web : l'Allemagne a fermé la marketplace Crimenetwork !

1 1

Une nouvelle opération a été menée en Allemagne pour arrêter l'administrateur de la place de marché illégale Crimenetwork. Les serveurs ont été arrêtés.

#infosec #ceptbiro #security #allemagne #crimenetwork #cybersecurity

5h ago

From it-connect.fr

Veeam corrige une faille critique dans Service Provider Console

1 1

Veeam a publié de nouvelles mises à jour pour son produit Service Provider Console dans le but de corriger 2 vulnérabilités, dont une faille critique.

#Veeam #infosec #ceptbiro #security #cybersecurity #serviceproviderconsole #failledesecuritecritique

5h ago

From zdnet.fr

Smartphones pliables : des formats plus grands à l’horizon ? - ZDNET

1 1

Cette évolution permettrait d'optimiser l'agencement des composants, et ainsi, de proposer des appareils pliables bien plus fins.

#infosec #ceptbiro #security #cybersecurity #smartphonespliables

5h ago

From helpnetsecurity.com

70% of open-source components are poorly or no longer maintained - Help Net Security

1 1

The geographic distribution of open-source contributions introduces geopolitical risks that organizations must urgently consider.

#infosec #ceptbiro #security #cybersecurity #opensourcecomponents

5h ago

From helpnetsecurity.com

SafeLine: Open-source web application firewall (WAF) - Help Net Security

1 1

SafeLine is an open-source and self-hosted Web Application Firewall (WAF) that protects websites from cyber attacks.

#waf #infosec #ceptbiro #safeline #security #opensource #cybersecurity #webapplicationfirewall

5h ago

From journaldemontreal.com

Une IA déguisée en grand-mère contre les arnaqueurs téléphoniques

1 1

Elle maintient les arnaqueurs en conversation avec elle en feignant de ne rien comprendre à la technologie.

#infosec #ceptbiro #security #grandmere #iadeguisee #cybersecurity #arnaqueurstelephoniques

5h ago

From presse-citron.net

Cyberattaque chez Norauto : vos données personnelles et papiers d’identité sont-ils concernés ?

1 1

Une cyberattaque d’envergure vient de frapper l’enseigne de maintenance automobile Norauto. Plus de 78 000 clients voient leurs données personnelles et administratives exposées dans cette fuite massive. Découvrez si vous faites partie des personnes touchées et les mesures à prendre.

#infosec #norauto #ceptbiro #security #cyberattaque #cybersecurity #papiersdidentite #donneespersonnelles

5h ago

From gbhackers.com

Google Chrome Security Update, Patch for High-severity Vulnerability

1 1

Google has released a significant security update for its Chrome browser, aiming to address several vulnerabilities and enhance user safety.

#Patch #infosec #ceptbiro #security #googlechrome #cybersecurity #vulnerability #securityupdate

5h ago

From it-connect.fr

Windows 11 : un avertissement intrusif sur les PC non compatibles

1 1

Microsoft a décidé d'embêter les utilisateurs qui installent Windows 11 sur un PC non compatible grâce à un filigrane sur le Bureau ! Mais, ce n'est pas tout...

#infosec #ceptbiro #security #Windows11 #microsoft #cybersecurity #pcnoncompatible

5h ago

From securitysales.com

Security Measures at the Intersection of Cloud and Artificial Intelligence (AI)

1 1

Security leaders must understand the value of their data sits at the core of integrating generative AI and cloud-native platforms.

#AI #cloud #infosec #ceptbiro #security #cybersecurity #securitymeasures #artificialintelligence

5h ago

From zdnet.fr

Pourquoi les prochaines lunettes connectées de Samsung nous enthousiasment plus que le S25 Ultra - ZDNET

1 1

De nouvelles informations indiquent que le géant coréen dévoilera ses premières lunettes connectées lors d'un événement Unpacked en janvier, aux côtés de la série Galaxy S25 attendue.

#infosec #samsung #ceptbiro #s25ultra #security #cybersecurity #lunettesconnectees

5h ago