perm_phone_msgVous subissez une attaque ? Contactez-nous +33 1 73 07 18 41

Cybersécurité

6 Results / Page 1 of 1

Background

aujourd'hui07/08/2020

  • 127
  • 3
Featuredstar
fermer

Cybersécurité + Malware + CTI + Threat Sébastien Guisnet

What is Threat Hunting and how it can benefit your organisation?

What is threat hunting and why we need it now ? Threat hunting designates all the activities conducted by a threat hunter or a cyberthreat analyst in order to find hidden persistent threats inside an organization’s infrastructure. Abnormal events such as a connection to an unknown server, access to a sensitive process memory or a DLL injection are some examples of what a ...

remediation and rollback your data after an attack

aujourd'hui11/06/2020

  • 244
  • 2
fermer

Cybersécurité + Ransomware + Nucleon Security News Antoine Botte

Rollback and Remediation against Hakbit Ransomware

Ransomwares are still the most widespread cyberattacks targeting corporate data. That’s why in addition of the Multi-Layer Zero-Trust implementation in Nucleon Smart Endpoint EDR, we now release new post-exploitation features. In this article we will demonstrate our rollback and remediation features against Hakbit ransomware. The goal is to reduce the ...

aujourd'hui27/03/2020

  • 261
fermer

Cybersécurité + Ransomware Sébastien Guisnet

Living Off the Land or Filleless Attacks

What are Living off the land or Filleless attacks and why is it a real Cybersecurity issue? The different appellations  Targeted and non-targeted cyberattacks use different operating methods to achieve their ends. Among these operating modes we find attacks without files. These can have several names: fileless attacks zero-footprint attacks non-malware attacks [...]
Protection of industries from cyberattacks

aujourd'hui26/02/2020

  • 90
fermer

Cybersécurité + Ransomware Antoine Botte

Cybersecurity challenges in the industrial sector

What are the new cybersecurity challenges facing manufacturers and how to mitigate the risks? Until today, manufacturers had two different IT work plans. The “classic” computer network, with servers and workstations connected to the Internet; and the production computer network, more isolated with equipment specific to industrial systems, machines rarely [...]

aujourd'hui27/01/2020

  • 1066
  • 2
fermer

Cybersécurité + Customer RSS Antoine Botte

Antivirus, EPP and EDR What Differences?

Today there are a very large number of types of point protection solutions. This large number does not facilitate the choice of its protection solution, especially since each of these solutions has very specific functionalities. It is however important to make this choice in conscience but also in knowledge. This is why it [...]

Gagnez du terrain sur la menace


Essayez gratuitement

Background