BLOG

5 Ways to make cybersecurity more efficient with automation

5 ways to make cybersecurity more efficient with automation Toward the end of 2019, the cybersecurity workforce amounted to 2.8 million professionals, while the number of trained professionals needed to close the gap was 4.07 million. This data hints at the urgent need to increase the current cybersecurity workforce by

Read more »

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL)

CVE-2020-0601 / VULNERABILITY IN THE CRYPTOAPI OF WINDOWS (CRYPT32.DLL) Execution of a Trojan horse signed with an exploit of the CVE-2020-0601 A spoofing vulnerability has been discovered in the way the Windows cryptographic library (crypt32.dll) validates certificates composed of elliptic curves (ECC). Successful exploitation of this loophole could lead to

Read more »

Targeted Ransomware and Cyber Insurance to Rise in 2020

Targeted Ransomware and Cyber Insurance to Rise in 2020 In 2019, experts predicted that one business will fall prey to ransomware every 14 seconds. By 2021, that span will shrink further to 11 seconds. The global ransomware damage costs are expected to escalate to up to $20 billion by then.

Read more »

Ransom War 1

RANSOM WAR #1 There is a significant increase in ransomwares attacks, with many organizations hit by (almost) unknown threats, mixing APT technologies with improved offensive features. Of course, after such an incident, companies should avoid paying the ransoms, and real backups could help in case of large incidents.  But let’s

Read more »

eGambit : a holistic cybersecurity solution

eGambit : a holistic cybersecurity solution INTRODUCTION According to a recent survey released by McKinsey, cybersecurity has become a top concern of the world’s business leaders that are willing to dedicate adequate funds to address it, yet lack appropriate, integrated and effective tools to support fast, fact-based cyber security management.

Read more »

EDR : ENDPOINT DETECTION & RESPONSE

EDR : Endpoint Detection & Response The protection of infrastructure endpoints (stations, servers, mobiles, etc.) is becoming a major focal point of cybersecurity. As traditional antivirus are having more trouble fighting alone, EDR agents are joining the battle to fight effectively against the technical threats of today. For several decades

Read more »

Some challenges for your SIEM

Some challenges for your SIEM How is it possible to design and optimize the implementation of SIEM-type infrastructures in complex environments? There are many elements to take into account: the variety of components, infrastructure sizes, limitations on human and financial resources, technological and organizational challenges, internal and external pressures and

Read more »

Memento Mori. Forensic Strategies.

Memento Mori. Forensic Strategies. IT infrastructures are expanding and becoming more complex, linking almost all the elements that make up the cybersphere. About 7 billion lives have become interconnected without taking into account the magnitude of the associated risks involved. Unfortunately, many people and entities are already happily using these

Read more »

eGambit Endpoint Security versus CrashOverride

eGambit Endpoint Security versus Crash Override Introduction This article will focus on offensive weapons disclosed (June 2017) and linked to Industrial Controls Systems (ICS) security issues. These tools would be linked to previous cyberattacks against critical infrastructure in Ukraine (2016). What to know about these malwares ? Family name :

Read more »

eGambit EDR versus WannaCrypt Ransomware

eGambit EDR versus WannaCrypt Ransomware This article will explore eGambit features to fight against massive ransomware attacks WannaCrypt. The reader will discover how Cyber Robots & Artificial Intelligence engines might get stronger than malwares… INTRODUCTION On May 12, 2017 before noon, the cybersecurity community discovered a massive spread of a

Read more »