Messages récents

Pages: [1] 2 3 4 5 6 7 8 ... 10
1
Mark your calendars and meet the Avast Business team at these great industry events

avast-business_rgb-positive-2.jpg


 


In 2018, our Avast Business team will be crossing state and international borders, hitting top IT and MSP industry events to meet with partners and showcase our latest and greatest. If one of these events happens to be in your area, please take advantage of our registration offers and drop by our booth so we can say hello in person. On top of getting a firsthand look at our latest offerings, you may just win big, too.


Source: Mark your calendars and meet the Avast Business team at these great industry events
2
NPM update changes critical Linux filesystem permissions, breaks everything

A recent update to the Node Package Manager introduced a bug that caused it to interfere with the operating system, by locking the system itself out of numerous mission-critical files
Source: NPM update changes critical Linux filesystem permissions, breaks everything
3
Windows 10 Insider Preview Build 17107 via Windows Update – canal Rapide

   Windows 10 Insider Preview, une nouvelle Build 17107 pour PC est disponible pour les Insiders, via Windows Update – canal Rapide https://blogs.windows.com/windowsexperience/2018/02/23/announcing-windows-10-insider-preview-build-17107-fast-ring/    
Source: Windows 10 Insider Preview Build 17107 via Windows Update – canal Rapide
4
Bonjour,

Windows 10 Insider Preview, une nouvelle Build 17107 pour PC est disponible pour les Insiders, via Windows Update – canal Rapide

https://blogs.windows.com/windowsexperience/2018/02/23/announcing-windows-10-insider-preview-build-17107-fast-ring/

@+
5
News / [FireEye]APT37 (Reaper): The Overlooked North Korean Actor
« Dernier message par igor51 le Hier à 20:00:23 »
APT37 (Reaper): The Overlooked North Korean Actor

On Feb. 2, 2018, we published a     href="https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html">blog
    detailing the use of an Adobe Flash zero-day
  vulnerability (CVE-2018-4878) by a suspected North Korean cyber
  espionage group that we now track as APT37 (Reaper).


 

Our analysis of APT37’s recent activity reveals that the group’s
  operations are expanding in scope and sophistication, with a toolset
  that includes access to zero-day vulnerabilities and wiper malware. We
  assess with high confidence that this activity is carried out on
  behalf of the North Korean government given malware development
  artifacts and targeting that aligns with North Korean state interests.
  FireEye iSIGHT Intelligence believes that APT37 is aligned with the
  activity publicly reported as     href="https://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf"
  target="_blank">Scarcruft and Group123.


 

Read our report,
          href="https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf"
      target="_blank">APT37 (Reaper): The Overlooked North Korean
  Actor
, to learn more about our assessment that this threat
  actor is working on behalf of the North Korean government, as well as
  various other details about their operations:


 

  •     Targeting: Primarily South Korea – though also Japan, Vietnam
        and the Middle East – in various industry verticals, including
        chemicals, electronics, manufacturing, aerospace, automotive, and
      healthcare.

  •     Initial Infection Tactics: Social engineering tactics
        tailored specifically to desired targets, strategic web compromises
        typical of targeted cyber espionage operations, and the use of
        torrent file-sharing sites to distribute malware more
      indiscriminately.

  •     Exploited Vulnerabilities: Frequent exploitation of
        vulnerabilities in Hangul Word Processor (HWP), as well as Adobe
        Flash. The group has demonstrated access to zero-day vulnerabilities
        (CVE-2018-0802), and the ability to incorporate them into
      operations.

  •     Command and Control Infrastructure: Compromised servers,
        messaging platforms, and cloud service providers to avoid detection.
        The group has shown increasing sophistication by improving their
        operational security over time.

  •     Malware: A diverse suite of malware for initial intrusion and
        exfiltration. Along with custom malware used for espionage purposes,
        APT37 also has access to destructive malware.

 

More information on this threat actor is found in our report,
          href="https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf"
      target="_blank">APT37 (Reaper): The Overlooked North Korean
  Actor
. You can also     href="https://www2.fireeye.com/WBNR-APT37-Overlooked-North-Korean-Threat.html"
    target="_blank">register for our upcoming webinar for additional
  insights into this group.


Source: APT37 (Reaper): The Overlooked North Korean Actor
6
Mark your calendars and meet the Avast Business team at these great industry events

avast-business_rgb-positive-2.jpg


 


In 2018, our Avast Business team will be crossing state and international borders, hitting top IT and MSP industry events to meet with partners and showcase our latest and greatest. If one of these events happens to be in your area, please take advantage of our registration offers and drop by our booth so we can say hello in person. On top of getting a firsthand look at our latest offerings, you may just win big, too.


Source: Mark your calendars and meet the Avast Business team at these great industry events
7
News / [Sophos]Bitcoin exchange founder charged with covering up hack
« Dernier message par igor51 le Hier à 17:00:08 »
Bitcoin exchange founder charged with covering up hack

Prosecutors charged Jon Montroll, chief of the belly-up BitFunder, of trying to cover up a hack that gutted it of 6,000 Bitcoins.
Source: Bitcoin exchange founder charged with covering up hack
8
Windows 10 / [Info] Vers des mises à jour Windows 10 plus rapides
« Dernier message par chantal11 le Hier à 16:42:24 »
Bonjour,

Citer
Vers des mises à jour Windows 10 plus rapides

 Microsoft réaffirme sa volonté de rendre les mises à jour Windows 10 plus rapides, et plus particulièrement pour l'upgrade.

Les promesses se multiplient pour les mises à jour Windows. Responsable du programme Windows Insider chez Microsoft, Dona Sarkar a confirmé sur Twitter que tous les utilisateurs profiteront d'améliorations à ce niveau quand il s'agit de passer d'une version majeure de Windows 10 à une autre.

Lire la suite sur GNT
9
News / [Sophos]Rancher sues Feds for sneaking a spy camera on to his land
« Dernier message par igor51 le Hier à 16:00:07 »
Rancher sues Feds for sneaking a spy camera on to his land

Just like that camera and the agents who stuck it in that tree, the federal lawsuit is treading on contentious territory
Source: Rancher sues Feds for sneaking a spy camera on to his land
10
News / [Sophos]5 signs you may be talking to a bot
« Dernier message par igor51 le Hier à 15:00:08 »
5 signs you may be talking to a bot

If you're on social media - be it Twitter, Facebook or Instagram - it's worth asking yourself: Can you tell when you're talking to a bot?
Source: 5 signs you may be talking to a bot
Pages: [1] 2 3 4 5 6 7 8 ... 10