Le ransomware ShrinkLocker utilise BitLocker pour chiffrer les machines Windows https://lnkd.in/eijcWWgs #Infosec #Security #Cybersecurity #CeptBiro #Ransomware #ShrinkLocker #BitLocker #Chiffrer #Windows
CeptBiro - Sécurité et Cybersécurité de l'information’s Post
More Relevant Posts
-
Security and Cybersecurity Advisor and Owner at CeptBiro - Sécurité et Cybersécurité de l'information
Le ransomware ShrinkLocker utilise BitLocker pour chiffrer les machines Windows https://lnkd.in/eR44BQyk #Infosec #Security #Cybersecurity #CeptBiro #Ransomware #ShrinkLocker #BitLocker #Chiffrer #Windows
Le ransomware ShrinkLocker chiffre Windows avec BitLocker
it-connect.fr
To view or add a comment, sign in
-
Security and Cybersecurity Advisor and Owner at CeptBiro - Sécurité et Cybersécurité de l'information
Microsoft améliore la protection anti-phishing de Windows 11 avec une option additionnelle https://lnkd.in/eDz6yJTk #Infosec #Secinfo #Security #CeptBiro #Cybersecurity #Microsoft #AntiPhishing #Windows11
Microsoft renforce la protection anti-phishing de Windows 11
it-connect.fr
To view or add a comment, sign in
-
Third one of the NetScaler identity blogs is out now. Have a read! #netscaler #identity #saml #oidc
Last one (for now); having SSO all the way to the application is critical for users and from security perspective. And most importantly; achievable with NetScaler. https://lnkd.in/dvmFsXGv #netscaler #identity #saml #oidc
To view or add a comment, sign in
-
-
🔔 A critical flaw in #Windows systems allows control to be taken over a system's #Wi-Fi without user interaction. The vulnerability, listed as #CVE-2024-30078, allows an attacker at range to set up a malicious Wi-Fi #network and infect PCs detecting this network... 💀 The exploit is not yet public and the only traces of POC I've found represent fake repositories with booby-trapped code on #GitHub as well as a posting on a cybercrime forum (the famous xss(.)is) where there's an advertisement for the sale of the associated exploit (veracity not yet validated).
🔔 A critical flaw in #Windows systems allows control to be taken over a system's #Wi-Fi without user interaction. The vulnerability, listed as #CVE-2024-30078, allows an attacker at range to set up a malicious Wi-Fi #network and infect PCs detecting this network... 💀 The exploit is not yet public and the only traces of POC I've found represent fake repositories with booby-trapped code on #GitHub as well as a posting on a cybercrime forum (the famous xss(.)is) where there's an advertisement for the sale of the associated exploit (veracity not yet validated). 🔐 This flaw allows the execution of malicious code with SYSTEM privileges, without authentication or interaction. It is particularly critical in places with many connected devices such as hotels and airports or similar. 💡 To protect yourself, immediately apply the patch released by Microsoft, activate your firewall (if you haven't already) and disable Wi-Fi when not in use. 👀 For more information, here are some interesting articles: - Forbes: https://lnkd.in/edQu2VZc - Microsoft: https://lnkd.in/eSXTX-rb 🔔 Une faille critique dans les systèmes Windows permet de prendre le contrôle via le Wi-Fi d'un système sans interaction de l'utilisateur. La vulnérabilité, répertoriée CVE-2024-30078, permet à un attaquant à portée de configurer un réseau Wi-Fi malveillant et d'infecter les PC détectant ce réseau ... 💀 L'exploit n'est pas encore public et les seules traces de POC que j'ai trouvées représentent de faux repositories avec des codes piégés sur GitHub ainsi qu'une annonce sur un forum de cybercriminalité (le fameux xss(.)is) où l'on trouve une annonce de vente de l'exploit associé (véracité non validée encore). 🔐 Cette faille permet l'exécution de code malveillant avec des privilèges SYSTEM, sans authentification ni interaction.Elle est particulièrement critique dans les lieux avec de nombreux appareils connectés comme les hôtels et les aeroports ou autre. 💡 Pour se protéger, appliquez immédiatement le correctif publié par Microsoft, activez votre pare-feu (si ce n'est pas encore fait) et désactivez le Wi-Fi lorsqu'il n'est pas utilisé. 👀 Pour plus d'informations, voici certains articles intéressants : - Forbes : https://lnkd.in/edQu2VZc - Microsoft : https://lnkd.in/eSXTX-rb
To view or add a comment, sign in
-
-
#Linux is the best-known alternative to #Windows or #MacOS and is also targeted by #security threats 📢 Analysts at Kaspersky have discovered a #malware lurking in #fdmpkg #freedownloadmanager for probably 3 years https://lnkd.in/eSh6w_XG #computers #security
Linux : les utilisateurs ont téléchargé un malware pendant des années en pensant se procurer un logiciel
phonandroid.com
To view or add a comment, sign in
-
Last one (for now); having SSO all the way to the application is critical for users and from security perspective. And most importantly; achievable with NetScaler. https://lnkd.in/dvmFsXGv #netscaler #identity #saml #oidc
To view or add a comment, sign in
-
-
Analista de Tecnologia da Informação | Segurança da Informação | Gestão de Tecnologia | Infraestrutura | Redes de Computadores | Cyber Security | Conscientização
Pacotes PyPI maliciosos transferem o malware WhiteSnake InfoStealer para máquinas Windows. https://lnkd.in/dKWe_8EA
Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines
thehackernews.com
To view or add a comment, sign in
-
Ransomware LockBit explora Citrix Bleed em ataques https://lnkd.in/ecnJ5vpk #mindsec #minutodaseguranca #informationsecurity #segurancadainformacao #cybersecurity #ciberseguranca
Ransomware LockBit explora Citrix Bleed em ataques | Minuto da Segurança da Informação
https://minutodaseguranca.blog.br
To view or add a comment, sign in
-
This #WakeUpWednesday addresses several #vulnerabilities in Citrix ADC, Citrix Gateway, Adobe Coldfusion and Ivanti Endpoint Manager Mobile. In addition, attention is paid to the increase in the use of Mallox ransomware. Finally, we discuss several distributed denial-of-service (DDoS) botnets that have been observed exploiting a critical vulnerability in Zyxel devices. https://lnkd.in/eiAzfZSW
Every Wednesday #WakeUpWednesday
tesorion.nl
To view or add a comment, sign in
-
Cloud Engineer / Architect, Azure, Entra ID, Active Directory, AAD Connect, Security, PowerShell Enthusiast
Seguimos asegurando las redes #Microsoft https://lnkd.in/dSRSZ9Q6 #Windows11 #Windows10 #WindowsServer2022 #WindowsServer2019 #WindowsServer2016 #Seguridad #Security #Microsoft #WindowsSecurity #authentication #MFA #2FA #RDP #ADFS #windowsserver Protecting Tier 0 the modern Way
Protecting Tier 0 the Modern Way
techcommunity.microsoft.com
To view or add a comment, sign in