in

Veille #Cybersécurité du 02/08/2014

Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !


Security researchers find serious exploitable flaws in 14 major Anti-Virus engines like AVG, Bitdefender, ESet, F-Secure


http://www.techworm.net/2014/07/security-researchers-find-serious.html

The Cyber Prosecutor Sending Nude-Photo Thieves To Prison


Wesley Hsu, head of the Cyber And Intellectual Property Crimes Section in the central district of California’s U.S. Attorneys’ OfficeFederal prosecutor Wesley Hsu has been working cybercrime cases for over a decade. Chief of the cyber crime unit at the U.S.

http://www.forbes.com/sites/kashmirhill/2014/07/31/federal-prosecutor-nude-photo-hackers/

NSA keeps low profile at hacker conventions despite past appearances


As hackers prepare to gather in Las Vegas for a pair of annual conventions, the leadership of the National Security Agency won’t make the trek.

http://www.theguardian.com/world/2014/jul/31/nsa-hacker-conventions-recruit-def-con-black-hat

Cyber Deterrence Is Working


Despite the mainstream view of cyberwar professionals and theorists, cyber deterrence is not only possible but has been working for decades. Cyberwar professionals are in the midst of a decades-old debate on how America could deter adversaries from attacking us in cyberspace.

http://www.defensenews.com/article/20140730/DEFFEAT05/307300017/Commentary-Cyber-Deterrence-Working

Spy of the Tiger


A recent report documents a group of attackers known as “PittyTiger” that appears to have been active since at least 2011; however, they may have been operating as far back as 2008. We have been monitoring the activities of this group and believe they are operating from China.

http://www.fireeye.com/blog/technical/threat-intelligence/2014/07/spy-of-the-tiger.html

U.S. Warns Retailers of ‘Backoff’ Malware


The U.S. Department of Homeland Security issued a notice Thursday indicating a new and virulent form of malware called “Backoff” has been used to infiltrate retailers’ computer systems. The alert from the U.S.

http://www.foxbusiness.com/technology/2014/07/31/us-warns-retailers-backoff-malware/

US requests $5b in extra funding to bolster cybercrime defences


US President Barack Obama’s defence agency is ramping up its efforts to fight cyber crime by requesting a $5 billion [£3 billion] package of extra funding for the upcoming year of activities.

http://www.itproportal.com/2014/07/31/us-requests-5b-extra-funding-bolster-cybercrime-defences/

Twitter acquiring password security manager startup Mitro Labs


Twitter password security could be changing, especially for corporate accounts staffed by multiple employees and teams. The San Francisco-headquartered company is acquiring Mitro Labs, a startup based in Lower Manhattan with a service designed for sharing passwords safely for a single account.

http://www.zdnet.com/twitter-acquiring-password-security-manager-startup-mitro-labs-7000032213/

InfoSec’s Holy Grail: Data Sharing & Collaboration


Despite all the best intentions, cooperation around Internet security is a still a work in progress. Case in point: Microsoft’s unilateral action against No-IP.

http://www.darkreading.com/operations/infosecs-holy-grail-data-sharing-and-collaboration-/a/d-id/1297633

Review of Penetration Testing A Hands-On Introduction to Hacking


Helping train a computer security incident response team (CSIRT) comes with the territory when building out an enterprise incident response process. As I was reading No Starch’s recently released Penetration Testing A Hands-On Introduction to Hacking book by Georgia Weldman I saw an opportunity.

http://journeyintoir.blogspot.com/2014/07/review-of-penetration-testing-hands-on.html

Book Review:


I recently received a copy of The Art of Memory Forensics (thanks, Jamie!!), with a request that I write a review of the book. Being a somewhat outspoken proponent of constructive and thoughtful feedback within the DFIR community, I agreed.

http://windowsir.blogspot.com/2014/07/book-review-art-of-memory-forensics.html

Calculating IDS Signature Precision


While signature-based detection isn’t enough on its own to protect a network against structured attackers, it is one of the cornerstones of a successful network security monitoring capability.

http://www.appliednsm.com/calculating-ids-signature-precision/

Do CISOs deserve a seat at the leadership table?


ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? « The CISO’s role has become increasingly complex and demanding, yet the value of their contributions aren’t fully understood or appreciated b

http://www.net-security.org/secworld.php

Etude du rapport sur la cybercriminalité « Protéger les INTERNAUTES »


Ce rapport s’inscrit dans le cadre du groupe de travail interministériel sur la lutte contre la cybercriminalité.

http://securitedessystemesjuridiques.blogspot.fr/2014/08/etude-du-rapport-sur-la.html

GCHQ certifies six cyber security Master’s degree courses


GCHQ, the British intelligence agency, has certified six Master’s degrees in cyber security as the government bids to close the much-talked about cyber-security skills gap.

http://www.computing.co.uk/ctg/news/2358425/gchq-certifies-six-cyber-security-master-s-degree-courses

Army names new commander for cyber training center


Maj. Gen. Stephen Fogarty (left) is taking over the Army’s Cyber Center of Excellence while Maj. Gen. LaWarren Patterson moves to the Installation Management Command. Army Chief of Staff Gen. Ray Odierno announced a change in command at the Army’s main cybersecurity training center on Aug. 1.

http://fcw.com/blogs/fcw-insider/2014/08/army-names-new-commander-for-cyber-training-center.aspx

Bulletin d’actualité CERTFR-2014-ACT-031


Le deuxième mardi de chaque mois, Microsoft publie une série de correctifs de failles de sécurité affectant ses produits. Internet Explorer figure généralement dans la liste, et les corruptions mémoire représentent souvent un fort pourcentage des failles qui y sont corrigées.

http://www.cert.ssi.gouv.fr/site/CERTFR-2014-ACT-031/CERTFR-2014-ACT-031.html

Recent Hacking of Canadian Government Agency Has All the Hallmarks of Chinese Military Cyber Espionage Unit in Shanghai


The recent hacking attempt on a sensitive Canadian government computer network is similar to attacks mounted by an elite unit of the Chinese army based in Shanghai, according to a cybersecurity expert.

http://www.matthewaid.com/post/93486631451



Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié : https://www.cyber-securite.fr/category/veille-cyber/feed

Vous aimerez aussi cet article:

Newsletter

Envie de ne louper aucun de nos articles ? Abonnez vous pour recevoir chaque semaine les meilleurs actualités avant tout le monde.

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *