October and November were pretty scary in terms of Data breaches. 😨👇🏼
In this video I am coming back on a lot of these breaches that have occurred in recent weeks. 👨🏼🏫
Full of interesting things, as usual, to help us understand the path followed by hackers to breach a system and thus see where it is interesting to put effort to improve the security of our system. 🛡
Basically, Password Manager, unique password for each site, long and complicated password for each site and make backups of your data. 👌🏼
So this way, you can avoid dictionnary and brute force attacks against the leaked passwords. 👍🏼
Links to the description of the Data Breaches :
Capcom : https://www.bleepingcomputer.com/news/security/capcom-confirms-data-breach-after-gamers-data-stolen-in-cyberattack/
Sopra Steria : https://www.clubic.com/antivirus-securite-informatique/interview-18496-sopra-steria-serieusement-touche-par-le-ransomware-ryuk-ce-qu-en-pensent-les-experts-cyber.html
GoDaddy : https://www.nextinpact.com/lebrief/44788/des-employes-godaddy-utilises-pour-attaquer-services-cryptomonnaies
MixCloud : https://www.zdnet.com/article/data-of-21-million-mixcloud-users-put-up-for-sale-on-the-dark-web/
BlackBaud : https://www.bbc.com/news/technology-54370568
London Neighborhoud Attack : https://www.zdnet.fr/actualites/un-quartier-de-londres-frappe-par-une-importante-cyberattaque-39911313.htm
Github : https://www.nextinpact.com/lebrief/44519/du-code-source-github-enterprise-server-fuite-sur-github-suite-a-erreur-github
The article that explains how to sign your commit with GPG :
https://dev.to/shostarsson/how-to-use-pgp-to-sign-your-commits-on-github-gitlab-bitbucket-3dae
The Zerologon vulnerability :
https://www.trendmicro.com/en_us/research/20/i/zerologon-and-value-of-virtual-patching.html
If you like this content, push the like button, that helps spread the message. 👍🏼
If you think it can be useful to anyone in your network, share it. 📨
Video produced by Wild & Secure, your consulting firm to all things security and real estate.
If you want to receive weekly quality content about security, subscribe to our newsletter on our website.
Top comments (1)
More than ever, malicious actors are after data... there are certainly important lessons to learn. Security by design is important too... when you get rid of the technical debt. Thanks for sharing!