
 Check Point Research’s security analysis spurs concerns over Google Bard’s limitations
				Check Point Research’s security analysis spurs concerns over Google Bard’s limitations
			13 July 2023 by Check Point Research (CPR)
 June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut
				June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut
			12 July 2023 by Check Point Research (CPR)
 Guardz Identifies New ‘ShadowVault’ macOS Stealer Malware
				Guardz Identifies New ‘ShadowVault’ macOS Stealer Malware 
			10 July 2023 by Guardz
 CyVers Discovers $126M Multichain Hack
				CyVers Discovers $126M Multichain Hack
			10 July 2023 by CyVers
 Blackfog: MOVEit attack and CLOP variant fuels surge in ransomware attacks in second highest month on record
				Blackfog: MOVEit attack and CLOP variant fuels surge in ransomware attacks in second highest month on record
			5 July 2023 by Dr Darren Williams, CEO and Founder at Blackfog
 Comment offer: Scams Awareness Week (3-9 July), by Matt Aldridge, OpenText Cybersecurity
				Comment offer: Scams Awareness Week (3-9 July), by Matt Aldridge, OpenText Cybersecurity
			5 July 2023 by Matt Aldridge, Principal Solutions Consultant at OpenText Security Solutions
 ReliaQuest: Construction and transportation sectors most targeted by cyber criminals
				  ReliaQuest: Construction and transportation sectors most targeted by cyber criminals
			29 June 2023 by ReliaQuest
 Zimperium Research Reveals Significant Increase in Sophisticated Attacks Against Mobile Devices
				Zimperium Research Reveals Significant Increase in Sophisticated Attacks Against Mobile Devices
			28 June 2023 by Zimperium
 Blackfog Comment: American and Southwest Airlines disclose data breaches
				Blackfog Comment: American and Southwest Airlines disclose data breaches
			27 June 2023 by Dr Darren Williams, CEO and Founder of Blackfog
 Threat Spotlight: Attackers use 15-year-old tactics to target security flaws
				Threat Spotlight: Attackers use 15-year-old tactics to target security flaws 
			26 June 2023 by Barracuda Networks
 Blackfog Comment on NCSC Lockbit Advisory
				Blackfog Comment on NCSC Lockbit Advisory
			16 June 2023 by Blackfog
 Hijacking S3 Buckets: New Attack Technique Exploited in the Wild by Supply Chain Attackers
				Hijacking S3 Buckets: New Attack Technique Exploited in the Wild by Supply Chain Attackers
			15 June 2023 by Checkmarx
 MOVEit Vulnerability Weaponized in Ransomware Attack
				 MOVEit Vulnerability Weaponized in Ransomware Attack
			14 June 2023 by Check Point
 Beware of Summer Scams: Vacation-Related Online Scams are on the rise, Warns Check Point Research
				Beware of Summer Scams: Vacation-Related Online Scams are on the rise, Warns Check Point Research
			13 June 2023 by Check Point Research (CPR)
 May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads
				May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads
			12 June 2023 by Check Point Research (CPR)
 MOVEit cyber extortion attack underlines resurgence in Russian cybercrime activity, says Databarracks
				MOVEit cyber extortion attack underlines resurgence in Russian cybercrime activity, says Databarracks
			9 June 2023 by Databarracks
 The commentary from Matt Aldridge, OpenText Cybersecurity about Leytonstone School cyber attack
				The commentary from Matt Aldridge, OpenText Cybersecurity about Leytonstone School cyber attack
			8 June 2023 by Matt Aldridge, Principal Solutions Consultant at OpenText Security Solutions
 Kimsuky strikes again - New social engineering campaign aims to steal credentials and gather strategic intelligence
				Kimsuky strikes again - New social engineering campaign aims to steal credentials and gather strategic intelligence
			6 June 2023 by SentinelLabs
 The BA, BBC, and Boots Cyber-Attack: Making Proactive Cybersecurity a Top Priority
				The BA, BBC, and Boots Cyber-Attack: Making Proactive Cybersecurity a Top Priority
			6 June 2023 by LogRhythm
 WithSecure Comment: BA, BBC, Nova Scotia gov, Boots hit by MOVEit Supply Chain attacks
				WithSecure Comment: BA, BBC, Nova Scotia gov, Boots hit by MOVEit Supply Chain attacks
			6 June 2023 by Timothy West, Head of Threat Intelligence, WithSecure
 Expert Comment: BA, BBC, Nova Scotia hit by MOVEit Supply Chain attack
				Expert Comment: BA, BBC, Nova Scotia hit by MOVEit Supply Chain attack
			6 June 2023 by Sylvain Cortes, VP Strategy and 17x Microsoft MVP, Hackuity
 Cybersecurity in former Soviet countries: Ukraine and the Baltic states are in the lead
				Cybersecurity in former Soviet countries: Ukraine and the Baltic states are in the lead
			31 May 2023 by Surfshark
 Ransomware driving professionalization of cyber crime
				Ransomware driving professionalization of cyber crime
			30 May 2023 by WithSecure
 Company Data Breaches:  Four Months Into 2023, More Than 340 Million Accounts Compromised
				Company Data Breaches:  Four Months Into 2023, More Than 340 Million Accounts Compromised
			30 May 2023 by Advisor
 SecurityHQ: Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know
				SecurityHQ: Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know
			28 May 2023 by SecurityHQ
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		
				
  
				
			
 
		 
		 Your podcast Here
 Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
 All new podcasts
 All new podcasts