Entrées par

, , ,

‘Lone Wolf’ Hacker Group Targeting Afghanistan and India with Commodity RATs

A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of commodity remote access trojans (RATs) that allow the adversary to gain complete control over the compromised endpoints. Cisco Talos attributed the cyber campaign to a « lone wolf » threat actor operating a Lahore-based fake […]

,

How To Leverage Social Proof Successfully

Customer reviews are incredibly valuable to your company. Around 95% of customers say they read reviews before they make a purchase. Another 72% say that they won’t even consider buying your items until they’ve read the reviews associated with your business or product.  No matter how good your marketing and promotion strategies might be, your […]

, , ,

Journée mondiale du chiffrement : remettre en cause le chiffrement fort menace l’économie et les populations

À l’occasion de la première Journée mondiale du chiffrement, plusieurs organismes de la société civile et entreprises de haute technologie du monde entier se sont regroupés dans le but de promouvoir l’utilisation du chiffrement fort, ainsi que de contrer les dangereuses tentatives des gouvernements et autorités en charge du maintien de l’ordre qui cherchent à […]

, , ,

Les fonctions de threat intelligence – plébiscitées par les fournisseurs de services managés

La majorité (93 %) des fournisseurs de services gérés (MSP) dans le monde et à l’échelle européenne envisagent d’ajouter de nouveaux services à leur offre de cybersécurité, à commencer par des fonctions de threat intelligence (46 % au niveau mondial contre 44 % à l’échelle européenne). The post Les fonctions de threat intelligence – plébiscitées […]

, , ,

Bug in Popular WinRAR Software Could Let Attackers Hack Your Computer

A new security weakness has been disclosed in the WinRAR trialware file archiver utility for Windows that could be abused by a remote attacker to execute arbitrary code on targeted systems, underscoring how vulnerabilities in such software could beсome a gateway for a roster of attacks. Tracked as CVE-2021-35052, the bug impacts the trial version […]

,

Unearthing Observability with New Relic

Is observability mission critical at this point? The folks at New Relic think so. And they’re not alone, according to their recent whitepaper on observability 90% of respondents believe observability is strategically important to their business. It’s becoming increasingly difficult to understand what’s going on within software development organizations. New Relic’s GVP & GM Buddy […]

,

Learn multithreading and async in 1 minute with Hyperlambda

For everyone having done multithreading and async programming, it’s fairly obvious that the amount of complexity required to (correctly) implement threading and async increases the cognitive requirements to understand the codebase to sometimes unfathomable amounts. Typically, this results in difficult to track down bugs, and over time what we often refer to as « spaghetti code » […]

, , ,

OWASP’s 2021 List Shuffle: A New Battle Plan and Primary Foe

Code injection attacks, the infamous king of vulnerabilities, have lost the top spot to broken access control as the worst of the worst, and developers need to take notice. In this increasingly chaotic world, there have always been a few constants that people could reliably count on: The sun will rise in the morning and […]