Tout savoir sur le Cyberscore
Introduction du dispositif Cyberscore Alors que nous vivons dans un monde de plus en plus numérisé, la question de la sécurité de nos données personnelles demeure au cœur des préoccupations. Qui n’a pas entendu parler d’une cyberattaque ces dernières années ? C’est...Cybercrime Threat Landscape August 2023
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of September 2023. This cybercrime threat landscape analysis will particularily highlight : Increase of ransomware attacks between August &...Lumma Stealer actively deployed in multiple campaigns
LummaC2 Stealer Key findings In this report are presented: Lumma Stealer, also known as LummaC2 Stealer, is a malware-as-a-service sold through Telegram and Russian-speaking cybercrime forums. In this report, the following will be addressed: The presence of Lumma in...Ongoing threats targeting the energy industry
Cyber Threats targetting the energy industry GuLoader Information report Key findings In this report are presented: The origin of the malware and information about the company running it. How multiple companies from the energy sector including, three French companies...Cybercrime Threat Landscape August 2023
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of August 2023. This cybercrime threat landscape analysis will particularily highlight : Decrease of ransomware attacks between July &...
Cybercrime Threat Landscape July 2023
Here is a retrospective of the major trends observed by Intrinsec’s Cyber Threat Intelligence team regarding the month of July 2023. This cybercrime threat landscape analysis will particularily highlight : Increase of ransomware attacks between June & July...Externaliser la gestion de sa cybersécurité, RSSI à temps partagé, pourquoi et comment ?
RSSI à temps partagé Dans le paysage numérique actuel, la protection des données et des systèmes informatiques est cruciale pour assurer la pérennité et la réputation d’une entreprise. Engager un Responsable de la Sécurité des Systèmes d’Information...Qu’est ce qu’un SOC (Security Operations Center) ?
SOC (Security Operations Center) Le SOC est avant tout une combinaison de moyens humains, organisationnels et technologiques, destinée à vous apporter une capacité pointue de détection, d’analyse et de traitement en permanence d’incidents de sécurité survenant dans...