par Lansec | Mar 20, 2019 | Sécurité
Open-source, industry standard specifications are available to protect your business, but real-world deployment is still lower than optimal. Spear phishing attacks continue to increase in popularity among cybercriminals, and businesses must take steps to protect...
par Lansec | Mar 13, 2019 | Sécurité
Learn how to install the open source security audit tool, OpenVAS, on the Ubuntu Server platform. OpenVAS is a full-featured vulnerability scanner that includes numerous tests that can run on your servers. OpenVAS Network Vulnerability Tests (NVTs) are served via the...
par Lansec | Mar 13, 2019 | Sécurité
Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute. Applying patches to vulnerabilities in products is not uniformly easy,...
par Lansec | Mar 7, 2019 | Sécurité
Taking certain common shortcuts when it comes to network and infrastructure security can leave your organization wide open to hackers, according to a Tuesday RSA 2019 session from Paula Januszkiewicz, CEO of CQURE. “Technology and security as we all know is not...
par Lansec | Mar 5, 2019 | Sécurité
Ransomware attacks in 2018 used Remote Desktop Protocol (RDP) as a main attack vector, according to a Webroot report. While ransomware attacks decreased in 2018, they also became much more targeted, according to the 2019 Webroot Threat Report released Thursday. The...
par Lansec | Fév 19, 2019 | Sécurité
Following revelations that Facebook, Google, Amazon, as well as purveyors of illicit content are abusing the Developer Enterprise Program, new reports show pirates are as well. Who’s left? An avalanche of reports over the last two weeks have shown that Facebook,...
par Lansec | Fév 18, 2019 | Sécurité
Keep local administrative accounts from being a malicious user’s target by creating an invisible account. Being in IT it’s natural to be concerned with the state of our network and the devices on them, but also the proverbial « weakest link in the chain »...
par Lansec | Fév 13, 2019 | Sécurité
Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account. Cybercriminals in search of fast money have taken to the Google Play Store in hopes of misdirecting transfers made on Android...
par Lansec | Fév 11, 2019 | Sécurité
The end of 2018 saw a spike in malicious attachments which businesses need to be wary of, according to a Proofpoint report. Hackers are relying substantially more on malicious URLs than email attachments in the course of committing crimes, according to...
par Lansec | Fév 5, 2019 | Sécurité
Palo Alto Networks’ Unit 42 recently discovered malware that we believe has been developed from OSX.DarthMiner, a malware known to target the Mac platform. This malware is capable of stealing browser cookies associated with mainstream cryptocurrency exchanges and...
Commentaires récents