Tag: EN

Detection engineering at scale: one step closer (part two)

In this article, we will build upon the previous discussion of our detection approach and associated challenges by detailing the regular and automated actions implemented through our CI/CD pipelines. La publication suivante Detection engineering at scale: one step closer (part…

New Attack Method Bypasses EDR with Low Privileged Access

A new endpoint detection and response (EDR) evasion technique has been identified that allows attackers with low-privilege access to bypass detection and operate under the radar. Unlike traditional evasion methods that require high privileges, this method exploits masquerading to deceive…

Beware of Fake DeepSeek PyPI packages that Delivers Malware

The Positive Technologies Expert Security Center (PT ESC) recently uncovered a malicious campaign targeting the Python Package Index (PyPI) repository. The campaign involved two packages, named deepseeek and deepseekai, designed to collect sensitive user data and environment variables. These packages…

Roundcube XSS Vulnerability Let Attackers Inject Malicious Files

A critical Cross-Site Scripting (XSS) vulnerability, tracked as CVE-2024-57004, has been discovered in Roundcube Webmail version 1.6.9.  This flaw allows remote authenticated users to upload malicious files disguised as email attachments, posing significant risks to individuals and organizations using the…

Canadian National Charged for Stealing $65 Million in Crypto

U.S. prosecutors have charged Andean Medjedovic, a 22-year-old Canadian, with five counts of criminal indictment for allegedly orchestrating a sophisticated cryptocurrency theft.  Medjedovic is accused of exploiting vulnerabilities in the KyberSwap and Indexed Finance DeFi protocols, resulting in significant financial…

What 2025 HIPAA Changes Mean to You

What 2025 HIPAA Changes Mean to You madhav Tue, 02/04/2025 – 04:49 < div> Thales comprehensive Data Security Platform helps you be compliant with 2025 HIPAA changes. You are going about your normal day, following routine process at your healthcare…

Why logs aren’t enough: Enhancing SIEM with AI-driven NDR

Join cybersecurity expert Jonathan Mayled from 5-hour Energy as he uncovers the limitations of log-based SIEMs and the transformative role of AI-driven Network Detection and Response (NDR). Logs alone can’t deliver the visibility and context required to secure modern, hybrid…

AI-Powered Security Management for the Hyperconnected World

Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several…