Ukraine/Russia war, a cyber war declared?

On Monday, February 21, 2022, Russian President Vladimir Putin announced the independence of the separatist regions (Donetsk People’s Republic and Lugansk People’s Republic) and began bombing the capital Kiev. Europe immediately condemned this decision, as did the United States, which initiated economic sanctions. A visible conflict The cyber risk: a less visible conflict The Ukrainian […]

What are the main cyberattacks on smartphones?

We consult it at least several times a day, and have a strong bond with it. It is a daily assistant that has become essential, and some people can feel lost without it. You will have guessed it, it is the smartphone. The cell phone, so precious for the user, is also precious for cybercriminals […]

IOT : How to protect yourself?

Second part of our dossier dedicated to IOT, after having seen the threats that weigh on these new tools that accompany our daily lives, let’s now see how to protect ourselves. What better way to understand an attack, than to put yourself in the shoes of the potential enemy? It is essential to keep in mind […]

IOT: What place for cybersecurity?

75 billion devices will be online by 2035 and according to the latest GALLUP survey from 2020 “Mobile users, on average, spend about 80% of their time outside the protected corporate network, accessing the Internet from locations other than the office or company.” These new objects are invading our home, our privacy and becoming not […]

NFT, the new Cybercrime paradise

NFT keyword searches have surpassed cryptocurrencies, this is the latest announcement from Google in December 2021. Digital design is on a roll! According to a report by DappRadar, last October, NFTs reportedly generated $148 million more compared to September. How can you not be greedy when you see so many dollars being generated? It was […]

French presidential elections 2022: What are the cyber risks?

The presidential elections in France are approaching, and with them the cyber risk. Tomorrow’s targets will be public sectors: town halls, prefectures, but also political parties or service providers. We can expect attacks on infrastructures directly, or denial of service attempts, or data theft on political party sites, polling institutes… Finally, we must not forget […]

Ukraine: what is this destructive malware disguised as ransomware?

The crisis between Russia and Ukraine is not new. Its origin is historical but accelerated with the events of 2014, which correspond to the annexation of Crimea by Russia. Tension is particularly high in the Donbass region. A tendency to thaw had been felt with the arrival of Volodymyr Oleksandrovytch Zelensky to power in 2019, […]

Buer Loader Analysis, a Rusted malware program

Malware analysis is part of the CTI team’s daily routine. This article presents the analysis of a Rust strain of Buer Loader from the reception of the samples to the writing of a stage2* extraction script. Despite several protection mechanisms, it was possible to extract all the samples in different ways. TEHTRIS provides the code […]

Identity theft: Causes and Consequences of a Dreadful Threat

The mathematician Jean Sylvain Bailly had no idea how meaningful this sentence could still be today. Cybercriminals, for their part, seem to have integrated it perfectly well. Data breaches are one of the most important activities in some Dark web forums, and identity theft is undoubtedly among the most lucrative. Whether in an organized gang […]

When Java fails, the world shivers

On the 24th of November, Alibaba security expert Chen Zhaojun reported the vulnerability known as CVE-2021-44228. “Log4j” is an Open Source logging library deployed in cloud services and companies’ software. Since the 10th of December, “Log4Shell” has been picked up by all cyber media. Such popularity is explained by its CVSS score of 10. It […]