Hameçonnage RH : les questionnaires d’auto-évaluation | Blog officiel de Kaspersky

En général, les grandes entreprises ne demandent pas à leurs employés quelles sont leurs aspirations professionnelles, quels sont leurs centres d’intérêt ou ce qu’ils savent faire en plus des compétences liées à leur poste. Cette situation change une fois par an, lors du bilan de performance. Pourtant, beaucoup d’employés aimeraient dire plus souvent ce qu’ils […]

Continue Reading

Shadow IT: Security policies may be a problem

3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use personal devices to do company work, the 334 IT, security and business professionals polled […]

Continue Reading

Attackers use fallback ransomware if LockBit gets blocked

Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates are using the 3AM ransomware as a fallback option in case LockBit gets flagged and blocked. 3AM ransomware LockBit is a known ransomware family that has been unleashing havoc for […]

Continue Reading

MetaStealer malware is targeting enterprise macOS users

Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – such as Advertising terms of reference (MacOS presentation).dmg and Brief_Presentation-Task_Overview-(SOW)-PlayersClub.dmg – and the inclusion of words such as “Official Brief Description” indicate […]

Continue Reading

Cisco VPNs with no MFA enabled hit by ransomware groups

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via Cisco ASA SSL VPN appliances. “In some cases, adversaries have conducted credential stuffing attacks that leveraged weak or default passwords; in others, the activity we’ve observed appears to be the result of targeted brute-force attacks […]

Continue Reading

Customizing LLMs for domain-specific tasks

The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes and has introduced fresh perspectives on the potential of AI, according to Predibase. Based on survey data from organizations experimenting with LLMs, researchers have found that enterprises are looking for ways to customize and deploy […]

Continue Reading