SlideShare a Scribd company logo
Cybersecurity winter is not coming…
Cybersecurity winter is already here.
WARNING, THIS ARTICLE CONTAINS SPOILERS.
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016,
a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless
pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world
served as an inspiration for George R. Martin.
JANUARY: hacktivists and cyber-terrorists, plot masters
The beginning of this year was marked by a strong growth in hacktivism. According to Hackmageddon, 27.7%
of the overall cyber-attacks recorded in January were related to political or religious beliefs. The attack that got
the ball rolling: Anonymous versus the Thai police. Seeing how the local police of Thailand had unfairly sentenced
to death two foreigners for the murder of a pair of British tourists, Anonymous immediately blocked all access
to its website, leaving a single message on the home page: “Failed law. We want justice. #BoycottThailand “.
While this may somehow seem “fair”, we also find a large number of cyber-terrorists (clearly Valar
Morghulis advocates) hiding among these hacktivists. As any other community, cyber-terrorists have become
increasingly more organized (read our previous article on hacking business models here), putting their
technological know-how at the disposal of general disorder. Stingier than the plot masters of Westeros, without
any regard for existing criminal or moral laws, nothing can come in their way when it comes to achieving their
goals.
FEBRUARY: a wall cannot protect you against malware
The cyber-heist of the Central Bank of Bangladesh shook the financial sector to its core when a group of
hackers managed to steal $ 81 million (approximately € 71.5 million) without anyone even noticing. Debts
were certainly paid. The case became even more controversial when the details of the attack were published,
announcing that the international financial institution in question had not previously installed a firewall.
Cybersecurity experts from around the world lost it that day. Although a single “wall” would not have been
enough to keep the outsiders at bay (read our article on the limitations of a firewall here), it still is a basic
cybersecurity measure. As hackers’ favorite target, banking organizations should be the first ones to set up a
« shield » against external threats. Otherwise, nothing can prevent the wildings from coming in through the
front door.
MARCH: ransomware or the Ramsey Bolton of digital extortion
A month after the Hollywood Presbyterian Medical Center agreed to pay the ransom in order to unlock its
system and resume its activity (a rather important activity taking into account the “public”), hackers declared
opened the hunting season on US healthcare institutions. In March, MedStar Health went through a typical
“Boltonian” experience in digital torture when its network, linking together ten hospitals, was infected by a
ransomware (read our article on data hostage situations here).
Another lesson we learned that month: paying a ransom does not guarantee that hackers will keep their word.
Rickon should have probably read this article before placing his trust in Ramsey, don’t you
think? #PoorRickon
APRIL: an Apple backdoor will not hold without Hodor
After the shooting of San Bernardino, the FBI came into possession of one of the iPhones used by the
terrorists and asked Apple to develop a new version of its iOS (read our article on the FBiOS here), which
would enable them to bypass some key security features of the iPhone. And what do you think the CEO of
Apple replied? No backdoor without Hodor. No, seriously now, Tim Cook bluntly stated that the government
could ensure that the FBiOS would not fall into the wrong hands.
We were then emerged in a heated debate between the defenders of security and those of privacy – a similar
debate to that between the faith and the crown in Westeros (before Cersei’s other son – we never remember
his name – sides with the Septon). Each party was fighting for its rightful place on the Iron Throne, while the
real dilemma was not who holds the most power, but rather how to combine these two elements together.
Without wildfire to solve the issue, the question still remains.
MAY: the old ways are vulnerable against Daenerys’s dragons
When the masters attacked the City of Maureen, Dany defied them by asserting their need to “get rid of the
Those monitoring the digital pulse of things quickly realized that it’s high time to head towards a different
approach (“new ways”) if they want to stay in the game. To deal with advanced and unpredictable threats, one
must stray from conventional methods. If Daenerys had the courage to ride a dragon, we can expand the limits
of our imagination too.
JUNE: not aware = not immune to white walkers
Beginning of the month, DDoS (distributed denial of service) attacks wreaked havoc in the French press (see our
article on the latest incidents here). June revealed itself as more generous than the previous months, attacking
all pillars of free expression – social networks, for instance (see our article here). All this because of the lack of
knowledge (or perhaps, the lack of will?) with concern to cybersecurity best practices and emerging cyber-
threats.
How can we protect ourselves against an army of zombies (botnets or not) if 1. we do not have the right
weapons and 2. we do not want to admit their existence. Hmm … well, we probably wouldn’t even have time to
ask the question.
Our mid-year review ends here (phew, we were starting to run out of Game of Thrones references), with a small
token of advice: fiction is not just mere exaggeration, sometimes it is there to inspire us to go beyond what is
achievable in the present. It is with this vision that we developed Reveelium, with the aim of spending more on
predicting attacks rather than treating them. The end of the last GoT season says it all (we were wrong, here’s
another reference): the war is just beginning. We will need assets such as Bran and Melisandre to deal with the
enemies.
Link:
https://www.reveelium.com/en/cybersecurity-winter-is-not-coming/

More Related Content

What's hot

Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
Blue Coat
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
Surender Singh
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
AnonDownload
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
Felipe Prado
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
hellishyard9256
 
Muso Publishing
Muso PublishingMuso Publishing
Muso Publishing
chrisjohnanderson
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
Michael Sexton
 
7 The Media as a Cause of Crime 3
7 The Media as a Cause of Crime 37 The Media as a Cause of Crime 3
7 The Media as a Cause of Crime 3
mattyp99
 
DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!
SeniorStoryteller
 
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
Sprawny Marketing by MaxROY.com
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
EMC
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
Filipinos as netizens darna in cyberspace
Filipinos as netizens  darna in cyberspaceFilipinos as netizens  darna in cyberspace
Filipinos as netizens darna in cyberspace
Milen Ramos
 
Cyber Attribution
Cyber AttributionCyber Attribution
Cyber Attribution
Data Source
 
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid itInternet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
Imtiaz alam
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
 

What's hot (18)

Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Muso Publishing
Muso PublishingMuso Publishing
Muso Publishing
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
 
7 The Media as a Cause of Crime 3
7 The Media as a Cause of Crime 37 The Media as a Cause of Crime 3
7 The Media as a Cause of Crime 3
 
DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!DevNexus 2016: Wait! Wait! Don't pwn me!
DevNexus 2016: Wait! Wait! Don't pwn me!
 
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
Michał Cortez, Serwisy NSFW jako źródło inpiracji (dla E-commerce), I ♥ Marke...
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Filipinos as netizens darna in cyberspace
Filipinos as netizens  darna in cyberspaceFilipinos as netizens  darna in cyberspace
Filipinos as netizens darna in cyberspace
 
Cyber Attribution
Cyber AttributionCyber Attribution
Cyber Attribution
 
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid itInternet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 

Viewers also liked

Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
catytv18
 
Visita museu 4º anos 01/07
Visita museu 4º anos 01/07Visita museu 4º anos 01/07
Visita museu 4º anos 01/07
emefbompastor
 
La reina de las hormigas
La reina de las hormigasLa reina de las hormigas
La reina de las hormigas
Elda Rodríguez
 
Adwords Irrelevant Enquiries
Adwords Irrelevant EnquiriesAdwords Irrelevant Enquiries
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
Сокальська ЗШ І-ІІІ ступенів №2
 
Festa julina 1
Festa julina 1Festa julina 1
Festa julina 1
emefbompastor
 
Componentes básicos do computador
Componentes básicos do computadorComponentes básicos do computador
Componentes básicos do computador
Nilson Mori
 
Componentes basicos de un computador
Componentes basicos de un computadorComponentes basicos de un computador
Componentes basicos de un computador
carocasanova
 
Plantio de mudas 6º ano 21 09
Plantio de mudas 6º ano 21 09Plantio de mudas 6º ano 21 09
Plantio de mudas 6º ano 21 09
emefbompastor
 
Semana farroupilha
Semana farroupilhaSemana farroupilha
Semana farroupilha
emefbompastor
 
アイデアを発展・整理するための便利なアプリとその使い方
アイデアを発展・整理するための便利なアプリとその使い方アイデアを発展・整理するための便利なアプリとその使い方
アイデアを発展・整理するための便利なアプリとその使い方
祐磨 堀
 

Viewers also liked (11)

Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
Caty treviño ¿qué estoy haciendo para mejorar la situación del mundo
 
Visita museu 4º anos 01/07
Visita museu 4º anos 01/07Visita museu 4º anos 01/07
Visita museu 4º anos 01/07
 
La reina de las hormigas
La reina de las hormigasLa reina de las hormigas
La reina de las hormigas
 
Adwords Irrelevant Enquiries
Adwords Irrelevant EnquiriesAdwords Irrelevant Enquiries
Adwords Irrelevant Enquiries
 
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
урок 30 розробка плану створення презентації визначення мети, сценарію та стр...
 
Festa julina 1
Festa julina 1Festa julina 1
Festa julina 1
 
Componentes básicos do computador
Componentes básicos do computadorComponentes básicos do computador
Componentes básicos do computador
 
Componentes basicos de un computador
Componentes basicos de un computadorComponentes basicos de un computador
Componentes basicos de un computador
 
Plantio de mudas 6º ano 21 09
Plantio de mudas 6º ano 21 09Plantio de mudas 6º ano 21 09
Plantio de mudas 6º ano 21 09
 
Semana farroupilha
Semana farroupilhaSemana farroupilha
Semana farroupilha
 
アイデアを発展・整理するための便利なアプリとその使い方
アイデアを発展・整理するための便利なアプリとその使い方アイデアを発展・整理するための便利なアプリとその使い方
アイデアを発展・整理するための便利なアプリとその使い方
 

Similar to Cybersecurity winter is not coming…

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
Matthew Assarian
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
ITrust - Cybersecurity as a Service
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
Christina Ramirez
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
Desarae Veit
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
Felipe Prado
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Securicon
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
Felipe Prado
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
Cyber Security Partners
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Custom Paper Services
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 

Similar to Cybersecurity winter is not coming… (15)

article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 

More from ITrust - Cybersecurity as a Service

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
ITrust - Cybersecurity as a Service
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
ITrust - Cybersecurity as a Service
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
ITrust - Cybersecurity as a Service
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
ITrust - Cybersecurity as a Service
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
ITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
ITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
ITrust - Cybersecurity as a Service
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
ITrust - Cybersecurity as a Service
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
ITrust - Cybersecurity as a Service
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
ITrust - Cybersecurity as a Service
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
ITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
ITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
ITrust - Cybersecurity as a Service
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
ITrust - Cybersecurity as a Service
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
ITrust - Cybersecurity as a Service
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
ITrust - Cybersecurity as a Service
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
ITrust - Cybersecurity as a Service
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
ITrust - Cybersecurity as a Service
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
ITrust - Cybersecurity as a Service
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Recently uploaded

WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
narinav14
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
sandeepmenon62
 

Recently uploaded (20)

WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and MoreManyata Tech Park Bangalore_ Infrastructure, Facilities and More
Manyata Tech Park Bangalore_ Infrastructure, Facilities and More
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
 

Cybersecurity winter is not coming…

  • 1. Cybersecurity winter is not coming… Cybersecurity winter is already here. WARNING, THIS ARTICLE CONTAINS SPOILERS. If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin. JANUARY: hacktivists and cyber-terrorists, plot masters The beginning of this year was marked by a strong growth in hacktivism. According to Hackmageddon, 27.7% of the overall cyber-attacks recorded in January were related to political or religious beliefs. The attack that got the ball rolling: Anonymous versus the Thai police. Seeing how the local police of Thailand had unfairly sentenced to death two foreigners for the murder of a pair of British tourists, Anonymous immediately blocked all access to its website, leaving a single message on the home page: “Failed law. We want justice. #BoycottThailand “. While this may somehow seem “fair”, we also find a large number of cyber-terrorists (clearly Valar Morghulis advocates) hiding among these hacktivists. As any other community, cyber-terrorists have become increasingly more organized (read our previous article on hacking business models here), putting their technological know-how at the disposal of general disorder. Stingier than the plot masters of Westeros, without any regard for existing criminal or moral laws, nothing can come in their way when it comes to achieving their goals.
  • 2. FEBRUARY: a wall cannot protect you against malware The cyber-heist of the Central Bank of Bangladesh shook the financial sector to its core when a group of hackers managed to steal $ 81 million (approximately € 71.5 million) without anyone even noticing. Debts were certainly paid. The case became even more controversial when the details of the attack were published, announcing that the international financial institution in question had not previously installed a firewall. Cybersecurity experts from around the world lost it that day. Although a single “wall” would not have been enough to keep the outsiders at bay (read our article on the limitations of a firewall here), it still is a basic cybersecurity measure. As hackers’ favorite target, banking organizations should be the first ones to set up a « shield » against external threats. Otherwise, nothing can prevent the wildings from coming in through the front door. MARCH: ransomware or the Ramsey Bolton of digital extortion A month after the Hollywood Presbyterian Medical Center agreed to pay the ransom in order to unlock its system and resume its activity (a rather important activity taking into account the “public”), hackers declared opened the hunting season on US healthcare institutions. In March, MedStar Health went through a typical “Boltonian” experience in digital torture when its network, linking together ten hospitals, was infected by a ransomware (read our article on data hostage situations here). Another lesson we learned that month: paying a ransom does not guarantee that hackers will keep their word. Rickon should have probably read this article before placing his trust in Ramsey, don’t you think? #PoorRickon APRIL: an Apple backdoor will not hold without Hodor After the shooting of San Bernardino, the FBI came into possession of one of the iPhones used by the terrorists and asked Apple to develop a new version of its iOS (read our article on the FBiOS here), which would enable them to bypass some key security features of the iPhone. And what do you think the CEO of Apple replied? No backdoor without Hodor. No, seriously now, Tim Cook bluntly stated that the government could ensure that the FBiOS would not fall into the wrong hands. We were then emerged in a heated debate between the defenders of security and those of privacy – a similar debate to that between the faith and the crown in Westeros (before Cersei’s other son – we never remember his name – sides with the Septon). Each party was fighting for its rightful place on the Iron Throne, while the real dilemma was not who holds the most power, but rather how to combine these two elements together. Without wildfire to solve the issue, the question still remains. MAY: the old ways are vulnerable against Daenerys’s dragons When the masters attacked the City of Maureen, Dany defied them by asserting their need to “get rid of the
  • 3. Those monitoring the digital pulse of things quickly realized that it’s high time to head towards a different approach (“new ways”) if they want to stay in the game. To deal with advanced and unpredictable threats, one must stray from conventional methods. If Daenerys had the courage to ride a dragon, we can expand the limits of our imagination too. JUNE: not aware = not immune to white walkers Beginning of the month, DDoS (distributed denial of service) attacks wreaked havoc in the French press (see our article on the latest incidents here). June revealed itself as more generous than the previous months, attacking all pillars of free expression – social networks, for instance (see our article here). All this because of the lack of knowledge (or perhaps, the lack of will?) with concern to cybersecurity best practices and emerging cyber- threats. How can we protect ourselves against an army of zombies (botnets or not) if 1. we do not have the right weapons and 2. we do not want to admit their existence. Hmm … well, we probably wouldn’t even have time to ask the question. Our mid-year review ends here (phew, we were starting to run out of Game of Thrones references), with a small token of advice: fiction is not just mere exaggeration, sometimes it is there to inspire us to go beyond what is achievable in the present. It is with this vision that we developed Reveelium, with the aim of spending more on predicting attacks rather than treating them. The end of the last GoT season says it all (we were wrong, here’s another reference): the war is just beginning. We will need assets such as Bran and Melisandre to deal with the enemies. Link: https://www.reveelium.com/en/cybersecurity-winter-is-not-coming/