perm_phone_msgVous subissez une attaque ? Contactez-nous +33 1 73 07 18 41

sebastien.guisnet

4 Results / Page 1 of 1

Background

aujourd'hui03/12/2020

  • 109
  • 1
fermer

Cybersécurité + Ransomware + Threat Sébastien Guisnet

Qu’est-ce que le Machine Learning et le Multi-Layer Zero-Trust et pourquoi les utiliser dans un EDR ?

Machine Learning and Multi-Layer Zero Trust, the winning combo for an efficient EDR. You’re maybe searching for your EDR (Endpoint Detection and Response). During the research of the perfect data and endpoints protection software, you may read a lot of scientific and abstract terms. In this article, we’ll uncover information ...

aujourd'hui07/08/2020

  • 1418
  • 4
Featuredstar
fermer

Cybersécurité + Malware + CTI + Threat Sébastien Guisnet

What is Threat Hunting and how it can benefit your organisation?

What is threat hunting and why we need it now ? Threat hunting designates all the activities conducted by a threat hunter or a cyberthreat analyst in order to find hidden persistent threats inside an organization’s infrastructure. Abnormal events such as a connection to an unknown server, access to a sensitive process memory or a DLL injection are some examples of what a ...

Execution of Corana Malware with Nucleon Smart Endpoint EDR

aujourd'hui27/04/2020

  • 368
  • 2
fermer

Malware Sébastien Guisnet

Corona-Malware la nouvelle tendance pour voler vos données

This new malware (Corona-virus-Map.exe) masquerades as an application for monitoring cases of Coronavirus infections. This program is apparently a software allowing to visualize the infection map of Coronavirus, it is based on the official map ( https://gisanddata.maps.arcgis.com/apps/opsdashboard/index.html#/ bda7594740fd40299423467b48e9ecf6 ) by integrating browser viewing functionality as seen in the screenshot. But this [...]

aujourd'hui27/03/2020

  • 729
  • 1
fermer

Cybersécurité + Ransomware Sébastien Guisnet

Living Off the Land or Filleless Attacks

What are Living off the land or Filleless attacks and why is it a real Cybersecurity issue? The different appellations  Targeted and non-targeted cyberattacks use different operating methods to achieve their ends. Among these operating modes we find attacks without files. These can have several names: fileless attacks zero-footprint attacks non-malware attacks [...]

Gagnez du terrain sur la menace


Essayez gratuitement

Background