TECH FOCUS SysJoker: Windows Version To produce this tech focus, we used data from: New SysJoker Backdoor Targets Windows, Linux, and macOS - Intezer CERT-W: FROM THE FRONT LINE The First Responder Word Reading Of The Month To learn more about…
Tag: cybersecurity
THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT The ransomware threat is increasing continuously and is now considered a national threat for countries, such as the US, France, or the UK. Last summer, the Virtual System Administrator (VSA) edited…
DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is Emotet?…
Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you…
Monthly indicators TOP ATTACK The massive SolarWind hack Russian SVR Hackers have been romping through some 18,000 of SolarsWinds' Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain…
Monthly indicators TOP ATTACK Brazilian government recovers from "worst-ever" cyberattack After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3rd , the Superior Electoral Court (STJ, in the Portuguese acronym) has managed to…
In a previous article, we shared an initial analysis of the dynamics of the cyber security startup ecosystem in France. The panorama of startups remains constant, with newly created startups already showing great promise. Others, with already several years of…
Towards realization despite adversity? Last year marked the beginning of the French cybersecurity startups ecosystem transformation. This year, many questions are being asked: has the momentum continued despite the health crisis? How has the ecosystem responded? What actions would support it…
We talked about it in a previous article, the agile digital transformation is on the way and this new model requires a total rethinking of the way security is integrated into projects. In this article, we will discover how to…
After many twists and turns in the year 2020, one thing is certain: the future does not wait. Today, the major challenge of cybersecurity lies essentially in the training of employees. Human error is involved in more than 90% of…