Messages récents

Pages: 1 2 3 [4] 5 6 7 8 9 10
31
News / [Eset]Ground zero: 5 things to do after discovering a cyberattack
« Dernier message par igor51 le novembre 04, 2025, 23:00:46 »
Ground zero: 5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster

Source: Ground zero: 5 things to do after discovering a cyberattack
32
News / [Eset]This month in security with Tony Anscombe – October 2025 edition
« Dernier message par igor51 le novembre 04, 2025, 22:00:12 »
This month in security with Tony Anscombe – October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now

Source: This month in security with Tony Anscombe – October 2025 edition
33
News / [Eset]Fraud prevention: How to help older family members avoid scams
« Dernier message par igor51 le novembre 04, 2025, 21:03:19 »
Fraud prevention: How to help older family members avoid scams

Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically

Source: Fraud prevention: How to help older family members avoid scams
34
News / [Eset]Cybersecurity Awareness Month 2025: When seeing isn't believing
« Dernier message par igor51 le novembre 04, 2025, 20:01:07 »
Cybersecurity Awareness Month 2025: When seeing isn't believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams

Source: Cybersecurity Awareness Month 2025: When seeing isn't believing
35
News / [CERT-AVIS]Multiples vulnérabilités dans Google Android (04 novembre 2025)
« Dernier message par igor51 le novembre 04, 2025, 19:04:09 »
Multiples vulnérabilités dans Google Android (04 novembre 2025)

De multiples vulnérabilités ont été découvertes dans Google Android. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une élévation de privilèges.
Source: Multiples vulnérabilités dans Google Android (04 novembre 2025)
36
News / [Eset]Recruitment red flags: Can you spot a spy posing as a job seeker?
« Dernier message par igor51 le novembre 04, 2025, 19:04:01 »
Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Source: Recruitment red flags: Can you spot a spy posing as a job seeker?
37
News / [Eset]How MDR can give MSPs the edge in a competitive market
« Dernier message par igor51 le novembre 04, 2025, 18:03:41 »
How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs

Source: How MDR can give MSPs the edge in a competitive market
38
News / [Eset]Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows
« Dernier message par igor51 le novembre 04, 2025, 17:06:07 »
Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures

Source: Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows
39
News / [Eset]Gotta fly: Lazarus targets the UAV sector
« Dernier message par igor51 le novembre 04, 2025, 16:00:57 »
Gotta fly: Lazarus targets the UAV sector

ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group

Source: Gotta fly: Lazarus targets the UAV sector
40
News / [Eset]SnakeStealer: How it preys on personal data – and how you can protect yourself
« Dernier message par igor51 le novembre 04, 2025, 15:02:40 »
SnakeStealer: How it preys on personal data – and how you can protect yourself

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts

Source: SnakeStealer: How it preys on personal data – and how you can protect yourself
Pages: 1 2 3 [4] 5 6 7 8 9 10

Erreur de base de données

Merci de réessayer. Si l'erreur se reproduit, signalez cette erreur à un administrateur.