About Cedric Pernet

This author has not yet filled in any details.
So far Cedric Pernet has created 15 blog entries.

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. The post Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics M...

By |2023-03-23T19:18:54+00:00March 23, 2023|cybersecurity, mfa, Microsoft, multifactor authentication, phishing, Security, Uncategorized|Comments Off on Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. The post First Dero cryptojacking campaign targets unprotected Kubernetes instances appeared fir...

By |2023-03-20T12:20:30+00:00March 20, 2023|blockchain, Cloud, cryptocurrency, cryptojacking, cybersecurity, dero, docker, Innovation, kubernetes, monero, Networking, Security, Uncategorized|Comments Off on First Dero cryptojacking campaign targets unprotected Kubernetes instances

Attack campaign on edge appliance: undetected since 2021 and resists firmware update

A possible Chinese attack campaign on compromised unpatched SonicWall SMA edge devices stayed undetected since 2021 and could persist even through firmware updates. The post Attack campaign on edge appliance: undetected since 2021 and resists firmware ...

By |2023-03-14T20:25:29+00:00March 14, 2023|cybersecurity, Edge, edge devices, Security, sonicwall, Uncategorized|Comments Off on Attack campaign on edge appliance: undetected since 2021 and resists firmware update

SYS01 stealer targets Facebook business accounts and browser credentials

The SYS01 infection chain uses DLL sideloading to steal information. Learn how to protect your business from this cybersecurity threat. The post SYS01 stealer targets Facebook business accounts and browser credentials appeared first on TechRepublic.

By |2023-03-13T19:11:12+00:00March 13, 2023|chromium, credential theft, cybersecurity, data theft, dll sideloading, facebook, malware, Security, Uncategorized|Comments Off on SYS01 stealer targets Facebook business accounts and browser credentials

Digital forensics and incident response: The most common DFIR incidents

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR incidents appeared first on TechRepublic.

By |2023-02-24T23:57:42+00:00February 24, 2023|CXO, cybersecurity, digital forensics, incident response, Security, Uncategorized|Comments Off on Digital forensics and incident response: The most common DFIR incidents

Cryptocurrency users in the US hit by ransomware and Clipper malware

Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic.

By |2023-02-16T18:07:49+00:00February 16, 2023|cryptocurrency, cybersecurity, malware, phishing, ransomware, Security, Uncategorized|Comments Off on Cryptocurrency users in the US hit by ransomware and Clipper malware

Royal ransomware spreads to Linux and VMware ESXi

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic.

By |2023-02-10T20:20:26+00:00February 10, 2023|linux, malware, Open source, ransomware, royal, royal ransomware, Security, Uncategorized, Virtualization|Comments Off on Royal ransomware spreads to Linux and VMware ESXi

How IT jobs and recruiting on the dark web might trick you

A new Kaspersky report sheds light on why some tech pros look for jobs on the dark web and how to spot suspicious and likely illegal positions from recruiters in that environment. The post How IT jobs and recruiting on the dark web might trick you appe...

By |2023-02-09T21:28:32+00:00February 9, 2023|cybersecurity, dark web, Developer, recruiting, Security, Tech & Work, tech jobs, Uncategorized|Comments Off on How IT jobs and recruiting on the dark web might trick you
Go to Top