Nos pr¨¦visions en mati¨¨re de s¨¦curit¨¦ pour l'ann¨¦e?2019 s'appuient sur l'analyse par nos experts de l'¨¦volution des technologies actuelles et ¨¦mergentes, du comportement des utilisateurs et des tendances du march¨¦.
Nos pr¨¦visions en mati¨¨re de s¨¦curit¨¦ pour l'ann¨¦e?2019 s'appuient sur l'analyse par nos experts de l'¨¦volution des technologies actuelles et ¨¦mergentes, du comportement des utilisateurs et des tendances du march¨¦.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.
Security researchers uncovered a new exploit kit, which they¡¯ve named Fallout, delivering downloader trojans, potentially unwanted applications (PUAs), and notably the GandCrab ransomware.
Attackers can extract messages from encrypted emails using the eFail attack, which exploits known vulnerabilities. Several of the most widely used email clients are affected.
Les incidents majeurs de s¨¦curit¨¦ survenus l'an pass¨¦ mettent ce paradoxe en ¨¦vidence, et leurs r¨¦percussions rendent la mise en ?uvre de protections intelligentes d'autant plus importante.
A security researcher found a remote code execution exploit that can potentially take over a range of devices with Broadcom Wi-Fi chips. The exploit is rooted in a vulnerability with the chip's firmware, similar to the Broadpwn exploit.
Major events shook the global threat landscape in the first half of 2017. Our midyear security roundup covers the old and the new, from ransomware and BEC scams to potential attacks against industrial robots.