perm_phone_msgUNDER ATTACK? Incident response LINE +33 1 73 07 18 41

Ransomware

5 Results / Page 1 of 1

Background

today03/12/2020

  • 49
  • 1
close

Cyber security + Ransomware + Threat Sébastien Guisnet

What are Machine Learning and Multi-Layer Zero-Trust and why use them in an EDR ?

Machine Learning and Multi-Layer Zero Trust, the winning combo for an efficient EDR. You’re maybe searching for your EDR (Endpoint Detection and Response). During the research of the perfect data and endpoints protection software, you may read a lot of scientific and abstract terms. In this article, we’ll uncover information ...

remediation and rollback your data after an attack

today11/06/2020

  • 409
  • 3
close

Cyber security + Ransomware + Nucleon Security News Antoine Botte

Rollback and Remediation against Hakbit Ransomware

Ransomwares are still the most widespread cyberattacks targeting corporate data. That’s why in addition of the Multi-Layer Zero-Trust implementation in Nucleon Smart Endpoint EDR, we now release new post-exploitation features. In this article we will demonstrate our rollback and remediation features against Hakbit ransomware. The goal is to reduce the ...

today27/03/2020

  • 598
  • 1
close

Cyber security + Ransomware Sébastien Guisnet

Living Off the Land or Filleless Attacks

What are Living off the land or Filleless attacks and why is it a real Cybersecurity issue? The different appellations  Targeted and non-targeted cyberattacks use different operating methods to achieve their ends. Among these operating modes we find attacks without files. These can have several names: fileless attacks zero-footprint attacks non-malware attacks [...]
Protection of industries from cyberattacks

today26/02/2020

  • 138
  • 1
close

Cyber security + Ransomware Antoine Botte

Cybersecurity challenges in the industrial sector

What are the new cybersecurity challenges facing manufacturers and how to mitigate the risks? Until today, manufacturers had two different IT work plans. The “classic” computer network, with servers and workstations connected to the Internet; and the production computer network, more isolated with equipment specific to industrial systems, machines rarely [...]

Gain ground on cybercriminals


Start Free Trial Now

Background