Comment le XDR se déploie sur les SI
Le passage à une détection qui va au-delà du endpoint semble inéluctable, une évolution vers les XDR qui va aussi impacter les SOC.
Researchers Uncover Malware Posing as WordPress Caching Plugin
Cybersecurity researchers have shed light on a new sophisticated strain of malware that masquerades a WordPress plugin to stealthily create administrator accounts and remotely control a compromised site. « Complete with a professional looking opening comment implying it is a caching plugin, this rogue code contains numerous functions, adds filters to prevent itself from being included […]
Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants
High-profile government and telecom entities in Asia have been targeted as part of an ongoing campaign since 2021 that’s designed to deploy basic backdoors and loaders for delivering next-stage malware. Cybersecurity company Check Point is tracking the activity under the name Stayin’ Alive. Targets include organizations located in Vietnam, Uzbekistan, Pakistan, and Kazakhstan. « The simplistic
Two High-Risk Security Flaws Discovered in Curl Library – New Patches Released
Patches have been released for two security flaws impacting the Curl data transfer library, the most severe of which could potentially result in code execution. The list of vulnerabilities is as follows – CVE-2023-38545 (CVSS score: 7.5) – SOCKS5 heap-based buffer overflow vulnerability CVE-2023-38546 (CVSS score: 5.0) – Cookie injection with none file CVE-2023-38545 is the more severe of […]
Les Assises 2023 – Un long chemin pour changer d’échelle dans la protection cyber
D’une édition à l’autre des Assises de la sécurité, le « passage à l’échelle » reste le mot d’ordre de l’ANSSI… qui a recentré sa perspective sur le facteur temps.
Over 17,000 WordPress Sites Compromised by Balada Injector in September 2023
More than 17,000 WordPress websites have been compromised in the month of September 2023 with malware known as Balada Injector, nearly twice the number of detections in August. Of these, 9,000 of the websites are said to have been infiltrated using a recently disclosed security flaw in the tagDiv Composer plugin (CVE-2023-3169, CVSS score: 6.1) that […]
U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-21608 (CVSS score: 7.8), the vulnerability has been described as a use-after-free bug that can be exploited to achieve remote code execution (RCE) with the
Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords
Passwords are at the core of securing access to an organization’s data. However, they also come with security vulnerabilities that stem from their inconvenience. With a growing list of credentials to keep track of, the average end-user can default to shortcuts. Instead of creating a strong and unique password for each account, they resort to […]
Cloud de confiance : quel positionnement pour les offres SecNumCloud ?
Comment les offres SecNumCloud se positionnent sur un marché très compétitif ? Quels sont les entreprises et les secteurs d’activité les plus intéressés ? Silicon a posé les questions à quelques fournisseurs de « Cloud de confiance ».
Le Cloud souverain joue la carte SecNumCloud
Après un début raté dans les années 2010, la notion de Cloud souverain semble enfin trouver écho chez les offreurs et surtout auprès des organisations. 2024 sera sans doute une année clé dans le développement de ce marché.