Gestion de la sécurité des identités : connaître les écueils pour les dépasser

La voie royale des criminels demeure le vol et l’usurpation d’identifiants, il est donc urgent que les entreprises se dotent d’une solution de gestion de la sécurité des identités. Cette dernière est en effet une composante clé de toute stratégie de cybersécurité pérenne de type Zero Trust.

CERTFR-2023-ACT-025 : Bulletin d’actualité CERTFR-2023-ACT-025 (12 juin 2023)

Ce bulletin d’actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas …

Critical RCE Flaw Discovered in Fortinet FortiGate Firewalls – Patch Now!

Fortinet has released patches to address a critical security flaw in its FortiGate firewalls that could be abused by a threat actor to achieve remote code execution. The vulnerability, tracked as CVE-2023-27997, is « reachable pre-authentication, on every SSL VPN appliance, » Lexfo Security researcher Charles Fol, who discovered and reported the flaw, said in a tweet over the weekend. […]

Apple’s Safari Private Browsing Now Automatically Removes Tracking Parameters in URLs

Apple is introducing major updates to Safari Private Browsing, offering users better protections against third-party trackers as they browse the web. « Advanced tracking and fingerprinting protections go even further to help prevent websites from using the latest techniques to track or identify a user’s device, » the iPhone maker said. « Private Browsing now locks when not in use, […]

Researchers Uncover Publisher Spoofing Bug in Microsoft Visual Studio Installer

Security researchers have warned about an « easily exploitable » flaw in the Microsoft Visual Studio installer that could be abused by a malicious actor to impersonate a legitimate publisher and distribute malicious extensions. « A threat actor could impersonate a popular publisher and issue a malicious extension to compromise a targeted system, » Varonis researcher Dolev Taler said. « Malicious

Why Now? The Rise of Attack Surface Management

The term « attack surface management » (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years. Gartner and Forrester have both highlighted the importance of ASM recently, multiple solution providers have emerged in the space, and investment and acquisition activity have seen an uptick. Many concepts come and go in cybersecurity, but attack surface […]

Cybercriminals Using Powerful BatCloak Engine to Make Malware Fully Undetectable

A fully undetectable (FUD) malware obfuscation engine named BatCloak is being used to deploy various malware strains since September 2022, while persistently evading antivirus detection. The samples grant « threat actors the ability to load numerous malware families and exploits with ease through highly obfuscated batch files, » Trend Micro researchers said. About 79.6% of the total 784 artifacts

Password Reset Hack Exposed in Honda’s E-Commerce Platform, Dealers Data at Risk

Security vulnerabilities discovered in Honda’s e-commerce platform could have been exploited to gain unrestricted access to sensitive dealer information. « Broken/missing access controls made it possible to access all data on the platform, even when logged in as a test account, » security researcher Eaton Zveare said in a report published last week. The platform is designed for the sale of […]

Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme

A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus rewards scheme since at least January 2021. « This massive campaign has likely resulted in thousands of people being scammed worldwide, » Trend Micro researchers said in a report published last week, linking it to a Russian-speaking threat actor […]

Attaques contre le MFA : des normes spécifiques et la biométrie peuvent les contrer

Si le MFA (l’authentification multifacteur) est par principe plus sûr que l’accès par mot de passe unique, toutes les solutions MFA ne se valent pas. Chacune doit être correctement configurée et gérée pour empêcher les cybercriminels de la contourner.

Me contacter