Back to Results
First PageMeta Content
French Resistance / Maquis des Vosges / Michelle de Bonneuil


Brèves 2015 S15 à S19 – La mare du Gof Actus Sécurité Grand public => CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files. «We uncovered a new crypto-ransomware variant with new rout
Add to Reading List

Document Date: 2015-05-10 14:04:27


Open Document

File Size: 1,47 MB

Share Result on Facebook

City

Moscow / The Hague / Rapport / FIC / /

Company

Fortinet / Twitter / FireEye Labs / TV5 / Symantec / Anthem / Le monde / AV Software / Apple / IBM / Box / Check Point / Adobe / Oracle / LogmeIn / Sony / Google / Verizon / VB.Net / Home Depot / GitHub / HP / Websense / Microsoft / Ryanair / /

Continent

Europe / /

Country

Netherlands / France / Brazil / China / India / Belgique / United States / Singapore / /

Currency

USD / EUR / /

Event

Product Issues / /

Facility

Harvard Law School’s International Human Rights Clinic / Singapore-based Interpol Global Complex / INTERPOL Global Complex / /

IndustryTerm

advertisement services / free software / technology abuse / advertising service / wireless sensors / social media / le serveur WEB / le serveur WEB est en danger / Web Server Survey / wireless card / bank / social networking / personal data processing / online payment platforms / computing / supervision tool / attack tool / criminal and civil law / antivirus software service / e-banditisme / online tool / Internet Security Threat Report / web-facing computers / remote administration tool / high-tech / bank accounts / e-commerce sites / sur le serveur WEB / e-réputation / afin de développer par exemple de nouveaux services / Web Credentials / banking / access bank accounts / /

Movie

Catch Me If You Can / Mind the Gap / /

NaturalFeature

Ryanair falls / /

OperatingSystem

Microsoft Windows / ISIS / Linux / /

Organization

Kaspersky Lab / Europol’s European Cybercrime Centre / OpenSource Intelligence / Virginia State Board of Elections / National Cyber Investigative Joint Task Force / Advanced Research Projects Agency / Carnegie Mellon University / European Union / National High Tech Crime Unit / Dutch government / Harvard Law School / FortiGuard Labs Threat Intelligence / InfraGard / Federal Bureau of Investigation / National Prosecutors Office / Department of State / Virginia Information Technologies Agency / White House / International police / Human Rights Watch / INTERPOL / /

Person

Parallel File / Rob Graham / Brian Krebs / Guillaume Lopes / Olivier Kempf / Luc Roudé / Didier Stevens / Henry Bakis / Ard van der Steur / Bert Koenders / Florian Grunow / José Bové / Felix Wilhelm / /

Position

Minister of Security / General / Minister of Foreign Affairs / premier / /

Product

Detailed Analysis / The Latest SQL Injection / Windows PC / ransomware encryptor / /

ProgrammingLanguage

SQL / php / Python / /

ProvinceOrState

Virginia / /

PublishedMedium

Bien / /

Region

Middle East / Southeast Asia / /

SportsEvent

tour de France / /

Technology

Linux / operating system / html / antivirus software / PHP / pdf / Firewall / smartphones / HTTP / Web Server / /

URL

www.cnil.fr/linstitution/actualite/article/article/bilan-2014-les-donnees-personnelles-au-coeur-du-debat-public-et-des-preoccupationsdes-franca / www.bordeauxmetropole.fr/sites/default/files/PDF/publications/guides/guide_de_demande_open_data.pdf / www.viruslist.com/fr/news?id=197471285 / www.cnil.fr/fileadmin/documents/La_CNIL/publications/CNIL_Dossier_de_presse_rapport_annuel_2014.pdf / www.hrw.org/node/133918 / www.ladocumentationfrancaise.fr/rapports-publics/154000264/index.shtml / www.fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html / www.insinuator.net/2015/04/troopers-packetwars-2015-write-up / www.arbornetworks.com/asert/2015/04/neverquest-a-global-threat-targeting-financials / www.fixsing.com/tv5monde-a-tentative-technical-analysis / www.wawaseb.com/lutile/wsl69.php / www.sans.org/reading-room/whitepapers/malicious/analyzing-backdoor-bot-mips-platform-35902 / www.observatoire-fic.com/newsletter-1 / www.cybereason.com/verizon-dbir-2015-takeaways-cybereason-edition / www.ladocumentationfrancaise.fr/rapports-publics/154000239/index.shtml / www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/security-for-smes/smeguide-tool / www.interpol.int/en/News-and-media/News/2015/N2015-038 / www.f-secure.com/weblog/archives/00002804.html / www.datasecuritybreach.fr/virus-rombertik-rien-de-nouveau-chezle-malveillant / www.mcafee.com/fr/security-awareness/articles/catch-me-if-youcan.aspx / www.wawaseb.com/lutile/wsl68.php / www.nextinpact.com/news/94036-rombertik-spywarequi-pratique-terre-brulee-sil-est-detecte.htm / www.arbornetworks.com/asert/2015/04/bedeps-dga-trading-foreign-exchange-for-malware-domains / www.harvest.ai/blog/2015/4/30/ive-got-99-problems-and-a-breach-aint-one / www.enisa.europa.eu/media/pressreleases/prs-in-french/outil-de-supervision-commun-pour-la-securite-des-systemes-de-telecommunication / www.enisa.europa.eu/media/pressreleases/prs-in-french/le-guide-de-securite-de-l2019enisa-et-l2019outil-en-ligne-pour-les-pme-passant-au-cloud / www.gccs2015.com/news/launch-global-forum-cyber-expertise-hague / www.hsc-news.com/archives/2015/000129.html / www.insinuator.net/2015/04/general-pr0ken-filesystem-hacking-ibms-gpfs / www.youtube.com/watch?v=rmWMEdA3Qs / www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2147488951 / www.nextinpact.com/news/93939-les-cinq-pistes-cese-pourencadrer-l-impression-3d.htm / www.lemonde.fr/pixels/article/2015/04/29/des-piratesinformatiques-volent-5-millions-de-dollars-a-ryanair_4625234_4408996.html / www.securityinsider-solucom.fr/2015/04/cert-solucomretour-sur-lactualite-de_23.html / www.netcomjournal.com/volumes/articlesV273/Netcom293-308.pdf / www.cyber-securite.fr/2015/04/15/on-se-reveille-lescyberattaques-oui-ca-existe-et-ca-pique / www.informationwarfarecenter.com/CIR/IWC-CIR-2015-April-7.pdf / www.irishtimes.com/news/crime-and-law/ryanair-falls-victim-to-4-6m-hacking-scam-via-chinese-bank-1.2192444 / www.lexsi-leblog.fr/cert/les-bras-casses-de-la-cybercriminalite.html / www.f-secure.com/documents/996508/1030745/CozyDuke / www.xylibox.com/2015/04/betabot-retrospective.html / www.troopers.de/media/filer_public/69/81/69812750-49b0-4631-a3e6fb402c88adf3/fwfggpfs_troopers15.pdf / www.lexsi-leblog.fr/audit/les-mots-de-passe-back-to-basics.html / www.cf2r.org/images/stories/RR/rr14-guilmain.pdf / www.hrw.org/sites/default/files/reports/arms0415_ForUpload_0.pdf / www.websense.com/content/websense-2015-threat-report.aspx / www.sans.org/reading-room/whitepapers/malicious/xtremerat-unicode-breaks-35897 / www.ladocumentationfrancaise.fr/var/storage/rapports-publics/154000264.pdf / www.hrw.org/news/2015/04/08/killer-robots-accountabilitygap / www.lepoint.fr/editos-du-point/jean-guisnel/cybersecurite-une-faillereste-toujours-possible-22-04-2015-1923282_53.php / www.viruslist.com/fr/news?id=197471286 / www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/security-forsmes/cloud-security-guide-for-smes / www.information-security.fr/gestion-des-mots-de-passe-personnels / www.nextinpact.com/news/93759-un-piratage-a-maisonblanche-qui-dure-depuis-mois.htm / www.ladocumentationfrancaise.fr/var/storage/rapports-publics/154000239.pdf / www.welivesecurity.com/2015/04/14/dutch-government- / www.enisa.europa.eu/activities/Resilience-andCIIP/Incidents-reporting/guideline-on-security-measures-for-article-4-and-article-13a / www.verizonenterprise.com/DBIR/2015 / www.symantec.com/security_response/publications/threatreport.jsp / www.nextinpact.com/news/93923-pas-taxe-copie-privee-surimprimantes-3d.htm / www.cert.ssi.gouv.fr/site/CERTFR-2015-ACT-017/CERTFR-2015-ACT-017.html / www.linkedin.com/pulse/meet-potnet-eran-goldstein / www.wawaseb.com/lutile/wsl70.php / www.enisa.europa.eu/media/press-releases/enisa2019s-security-guide-and-online-tool-for-smes-when-going-cloud / www.symantec.com/connect/blogs/2015-internet-security-threat-report-attackers-are-bigger-bolder-and-faster / www.egeablog.net/index.php?post/2015/03/26/Active-LIO / www.clubic.com/connexion-internet/fai-orange-livebox/actualite-762654-orange-livebox-2-change-mot-admin.html / www.lemonde.fr/ameriques/article/2015/04/26/lamaison-blanche-victime-d-une-cyberattaque-preocucupante_4622869_3222.html / www.slideshare.net/erangoldstein/meet-the-potnet / www.fireeye.com/company/pressreleases/2015/04/fireeye-reveals-details-of-decade-long-cyber-espionage-campaign.html / www.egeablog.net/index.php?post/2015/04/10/TV5-le-pi%C3%A8ge / www.nextinpact.com/news/93848-bilan-2014-cnil-5-825-plaintes-421-controles-18-sanctions-et-359-cookies-sur-page.htm / www.nextinpact.com/news/93782cyberattaque-tv5monde-on-est-dans-guerre-information.htm / www.interpol.int/News-andmedia/News/2015/N2015-039 / www.rslnmag.fr/post/2015/04/23/Anticiper-le-hacking-des-villesintelligentes.aspx / www.huffingtonpost.fr/thierry-berthier/programme-darpa-defense-medecine-innovation_b_7032712.html / www.lepoint.fr/high-tech-internet/l-ami-ricore-de-jose-bove-09-05-2015-1927369_47.php / www.enisa.europa.eu/media/press-releases/joint-supervision-tool-for-telecom-security / www.zataz.com/mots-de-passe-du-controle-ferroviaire-diffuses-ala-tv / www.cnil.fr/linstitution/missions/infographie-lactivite-de-la-cnil-en-2014 / www.nextinpact.com/news/93841-motpasse-admin-orange-met-a-jour-ses-livebox-2-et-les-livebox-play-suivront.htm / www.alain-bensoussan.com/rapport-activite-cnil/2015/05/07 / www.nextinpact.com/news/93810-france-televisions-colmate-enorme-fuite-donnees.htm / www.ladocumentationfrancaise.fr/rapports-publics/154000273/index.shtml / www.wawaseb.com/lutile/wsl71.php / www.cf2r.org/fr/rapports-du-cf2r/le-smart-power-au-secours-de-la-puissance-americaine.php / engagelab.com / www.darpa.mil/NewsEvents/Releases/2015/03/26.aspx / www.lemonde.fr/pixels/article/2015/04/15/piratefrance-televisions-a-ete-victime-d-une-importante-fuite-de-donnees_4616594_4408996.html / www.europol.europa.eu/content/international-police- / /

SocialTag