About Cedric Pernet

This author has not yet filled in any details.
So far Cedric Pernet has created 60 blog entries.

Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it.

By |2024-02-14T18:39:21+00:00February 14, 2024|Apple, commercial surveillance vendors, cybersecurity, data security, Google, International, mobile device security, Mobility, Security, security threat analysis, spyware, Uncategorized|Comments Off on Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked.

By |2024-01-29T20:52:21+00:00January 29, 2024|Big Data, cybersecurity, data encryption, data loss, International, ransomware, Security, security professionals, Uncategorized, United Kingdom|Comments Off on Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection. Read the FBI/CISA's tips for protecting against this malware threat.

By |2024-01-18T18:44:20+00:00January 18, 2024|Amazon, amazon simple email service, apache http server, AWS, Cloud, cloud security, cybersecurity, email security, malware, malware botnet, Microsoft, Microsoft 365, microsoft azure, Python, Security, sendgrid, spam, twilio, Uncategorized|Comments Off on Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

New Ivanti Secure VPN Zero-Day Vulnerabilities and Patches

Read details about the new Ivanti VPN zero-day vulnerabilities, along with the latest information about patches. Most of the exposed VPN appliances are reported to be in the U.S., followed by Japan and Germany.

By |2024-02-12T19:28:37+00:00January 12, 2024|cybersecurity, International, ivanti secure vpn, Networking, Security, security vulnerabilities, Uncategorized, VPN, zero-day vulnerabilities|Comments Off on New Ivanti Secure VPN Zero-Day Vulnerabilities and Patches

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats.

By |2023-12-22T22:47:44+00:00December 22, 2023|ai security, Android, app security, Artificial Intelligence, chatgpt, cryptocurrencies, cryptostealers, cybercrime, cybersecurity, Developer, eset, generative ai, Google, malware, Mobility, openai, Security, software development kits, spyware, threats and vulnerabilities, Uncategorized|Comments Off on ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat.

By |2023-12-12T19:00:56+00:00December 12, 2023|Big Data, CXO, cybersecurity, International, jobs, malware, Microsoft, proofpoint, recruiters, Security, social engineering, threat intelligence, Uncategorized|Comments Off on Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Based on the security researchers' analysis of the 2023 cyberthreat landscape, we highlight new or heightened risks.

By |2023-12-06T14:36:06+00:00December 6, 2023|cisco talos, commodity loader malware, CXO, cybersecurity, International, malware, network infrastructure attacks, Networking, ransomware, Security, Uncategorized|Comments Off on Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.

Kaspersky’s Advanced Persistent Threats Predictions for 2024

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky's security predictions. Get extensive APT mitigation tips, too.

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat.

By |2023-11-13T21:58:05+00:00November 13, 2023|CXO, cybersecurity, Data Centers, Google, Hardware, infrastructure, International, malware, Mandiant, Networking, operational technology, Security, security software, Uncategorized, wiping software|Comments Off on Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack
Go to Top