BLOG

Why IoT could be our greatest cybersecurity risk

Why IoT could be our greatest cybersecurity risk The Internet of Things offers us new ways to build potential value and offer it without human intervention. The seeming boon of the IoT is also its greatest risk. With over 26 billion devices projected to form part of the IoT in

Read more »

2020: The year of unknown cyber threats. Are you cyber-ready?

2020: The year of unknown cyber threats. Are you cyber-ready? Most traditional security systems and products are built to address known threats. When they see and detect something malicious, they block it. Now, to get past these products that block known threats, attackers are forced to innovate and come up

Read more »

Cyberthreat a worldwide risk? [and tips on navigating the threat]

Cyberthreat a worldwide risk? [and tips on navigating the threat] The 15th edition of the World Economic Forum’s Global Risk Report is out. Alongside recognizing the economic, environmental, geopolitical, and societal risks, the report also emphasizes on technological risks in the form of cyberattacks that face us in 2020, more

Read more »

5 Ways to make cybersecurity more efficient with automation

5 ways to make cybersecurity more efficient with automation Toward the end of 2019, the cybersecurity workforce amounted to 2.8 million professionals, while the number of trained professionals needed to close the gap was 4.07 million. This data hints at the urgent need to increase the current cybersecurity workforce by

Read more »

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL)

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL) Execution of a Trojan horse signed with an exploit of the CVE-2020-0601 A spoofing vulnerability has been discovered in the way the Windows cryptographic library (crypt32.dll) validates certificates composed of elliptic curves (ECC). Successful exploitation of this loophole could lead to

Read more »

Targeted Ransomware and Cyber Insurance to Rise in 2020

Targeted Ransomware and Cyber Insurance to Rise in 2020 In 2019, experts predicted that one business will fall prey to ransomware every 14 seconds. By 2021, that span will shrink further to 11 seconds. The global ransomware damage costs are expected to escalate to up to $20 billion by then.

Read more »

Ransom War 1

RANSOM WAR #1 There is a significant increase in ransomwares attacks, with many organizations hit by (almost) unknown threats, mixing APT technologies with improved offensive features. Of course, after such an incident, companies should avoid paying the ransoms, and real backups could help in case of large incidents.  But let’s

Read more »

eGambit : a holistic cybersecurity solution

eGambit : a holistic cybersecurity solution INTRODUCTION According to a recent survey released by McKinsey, cybersecurity has become a top concern of the world’s business leaders that are willing to dedicate adequate funds to address it, yet lack appropriate, integrated and effective tools to support fast, fact-based cyber security management.

Read more »

EDR : ENDPOINT DETECTION & RESPONSE

EDR : Endpoint Detection & Response The protection of infrastructure endpoints (stations, servers, mobiles, etc.) is becoming a major focal point of cybersecurity. As traditional antivirus are having more trouble fighting alone, EDR agents are joining the battle to fight effectively against the technical threats of today. For several decades

Read more »

Some challenges for your SIEM

Some challenges for your SIEM How is it possible to design and optimize the implementation of SIEM-type infrastructures in complex environments? There are many elements to take into account: the variety of components, infrastructure sizes, limitations on human and financial resources, technological and organizational challenges, internal and external pressures and

Read more »

Memento Mori. Forensic Strategies.

Memento Mori. Forensic Strategies. IT infrastructures are expanding and becoming more complex, linking almost all the elements that make up the cybersphere. About 7 billion lives have become interconnected without taking into account the magnitude of the associated risks involved. Unfortunately, many people and entities are already happily using these

Read more »

eGambit Endpoint Security versus CrashOverride

eGambit Endpoint Security versus Crash Override Introduction This article will focus on offensive weapons disclosed (June 2017) and linked to Industrial Controls Systems (ICS) security issues. These tools would be linked to previous cyberattacks against critical infrastructure in Ukraine (2016). What to know about these malwares ? Family name :

Read more »

eGambit EDR versus WannaCrypt Ransomware

eGambit EDR versus WannaCrypt Ransomware This article will explore eGambit features to fight against massive ransomware attacks WannaCrypt. The reader will discover how Cyber Robots & Artificial Intelligence engines might get stronger than malwares… INTRODUCTION On May 12, 2017 before noon, the cybersecurity community discovered a massive spread of a

Read more »