Security Dive

New articles!

Articles

May 31, 2022

New DDoS threats on the rise for emergency calling services

Landing PageSecurity DiveThreat research

Emergency calling services need to offer a 24/7 availability to the citizens. Unfortunately this is not always true due to new cyber threats…

March 31, 2022

Analysis of the most important CWEs for hardware security

Landing PageSecurity DiveVulnerabilities

Over the last few years, technological advances have continued to accelerate exponentially to meet the growing demand for reliable connectivity and robust security. As…

March 10, 2022

UEFI vulnerabilities affecting BullSequana servers VU796611

Landing PageProduct SecuritySecurity Dive

Vulnerabilities affecting BullSequana servers On February 1st, 2022, CERT-CC, Insyde Inc., and Binarly Inc. collectively disclosed a set of vulnerabilities affecting InsydeH2O Hardware-2-Operating System (H2O) UEFI Bios. These vulnerabilities…

February 28, 2022

Risks from the Cyberattacks in the RU-UA conflict

Landing PageSecurity DiveThreat research

Risks from the Cyberattacks in the RU-UA conflict Executive Summary With the ongoing conflict between Russia and Ukraine escalating, the risk remains high for…

February 15, 2022

Focus on information exchange between DevSecOps

ForensicLanding PageSecurity Dive

Red Team Lessons Learned Series – Episode 3 Focus on information exchange between DevSecOps   Introduction In this series of blog posts I wanted to highlight…

February 8, 2022

Do not neglect security in development systems

ForensicLanding PageSecurity Dive

Red Team Lessons Learned Series – Episode 2 Do not neglect security in development systems   Introduction In this series of blog posts I wanted to highlight…

February 1, 2022

Never feel afraid to report a security incident

ForensicLanding PageSecurity Dive

Red Team Lessons Learned Series – Episode 1 Never feel afraid to report a security incident   Introduction In this series of blog posts I wanted…

January 31, 2022

PwnKit CVE-2021-4034

Landing PageProduct SecuritySecurity Dive

PwnKit affecting SMC CVE-2021-4034 Users of the Atos Smart Management software suite should upgrade polkit component as soon as possible. A vulnerability in Polkit's pkexec component identified as CVE-2021-4034 (PwnKit) is present…

January 25, 2022

How to secure your organization against ransomware with EDR or MDR

Landing PageSecurity DiveTech trends

Ransomware is one of the most significant cyber threats to face organizations today. Time and again, threat actors have leveraged known…

January 18, 2022

Misconfigured firebase: A real-time cyber threat

Landing PageSecurity DiveVulnerabilities

Misconfigured firebase: A real-time cyber threat Every day, we hear about customer data being compromised, data posted on the dark web for sale, or a similar cybersecurity…

January 13, 2022

Poorly configured S3 Buckets – A hacker’s delight

Landing PageSecurity DiveVulnerabilities

Poorly configured S3 Buckets A hacker’s delight In today’s technological climate, finding the best way to store, share, and manage ever-increasing data sets is a huge…

December 16, 2021

Surge in malware loaders activity, a dangerous trend before the Christmas Holidays

Landing PageSecurity DiveThreat research

Surge in malware loaders activity A dangerous trend before the Christmas Holidays The Christmas Holidays are almost upon as. We…

December 15, 2021

HPC Log4Shell CVE-2021-44228

Landing PageProduct SecuritySecurity Dive

Log4Shell – Unauthenticated RCE 0-day exploit A vulnerability is present in all applications embedding Log4j (ver. 2.0 to 2.14.1.) for audit logging feature. Mainly Apache stack but also applications like…

December 13, 2021

Log4Shell - Unauthenticated RCE 0-day exploit

Landing PageThreat research

Log4Shell – Unauthenticated RCE 0-day exploit (CVE-2021-44228) In this blog, we provide background on Log4Shell vulnerability (CVE-2021-44228), detection guidance and we recommend mitigations. Vulnerability info Key…

December 7, 2021

External remote services attacks

Landing PageSecurity DiveThreat research

External remote services attacks How to stop one of today’s most common intrusion methods? Cybersecurity incidents are on the rise.[1] 64% of companies have suffered at least one incident. Ransomware grew by…

December 2, 2021

Public to public credential access

ForensicLanding PageSecurity Dive

Introduction The goal of this post is to draw some attention to a couple of very simple and effective attack vectors that let our team stealthily compromise an entire shared…

November 15, 2021

Offensive Linux tricks every defender should know about

Landing PageSecurity basicsSecurity Dive

Offensive Linux tricks every defender should know about Everyone doing a proper job of administrating nix-like systems should know these scenarios. The list below was put together based on my own experience. It is a set of tricks and…

November 4, 2021

BlackMatter ransomware

Landing PageSecurity DiveThreat research

Introduction Atos Digital Security regularly performs incident response and gathers information on various groups of attackers. Among them, BlackMatter stands out for its remarkably rapid rise despite its recent inception. This new group of attackers…

October 29, 2021

Cloud attacks: How to secure a growing threat vector

Landing PageThreat research

Cloud attacks: How to secure a growing threat vector   The cloud is a double-edged sword. On the one hand, organizations have used the…

October 26, 2021

Vertical specialized attacks- industry

Landing PageSecurity DiveThreat research

Vertical-specialized attacks: how to stay safe when your industry is under attack Cybersecurity has always been complex. These unique security challenges come from many places — your products, your digital…

September 30, 2021

Discovering Potentially Abusable Binaries with streamlined PE Import Table searching

Landing PageSecurity DiveThreat researchVulnerabilities

Introduction I decided to put this blog post together only to share a simple idea which could potentially be useful or inspirational to…

September 17, 2021

Phishing campaign using HTML Smuggling to get your Office365 credentials

Landing PageSecurity DiveThreat research

Threat Actors constantly evolve in their campaigns to be more successful as security tools are getting better and well-trained employees are more vigilant…

September 7, 2021

IOC Diversification as an Approach to Eradication Avoidance

ForensicLanding PageSecurity Dive

A while ago, during my first Red Team engagement with Atos, I came up with a tactical anti-eradication approach, which was directly inspired by my former…

September 1, 2021

Server-Side Template Injection

Landing PageSecurity DiveVulnerabilities

Templates are pre-formatted documents, which already contain certain information. A template engine is a specific kind of template processing module that exhibits all major features of a modern programming language. The developers…

June 7, 2021

Avaddon Ransomware Analysis

Landing PageSecurity DiveThreat research

Atos Digital Security regularly performs incident response and gather information on various attacker groups. Among them, Avaddon stands out for its modus operandi and its rise

February 14, 2021

Critical Exchange Vulnerability: Quick Grab on Detection & Mitigation

Landing PageSecurity DiveVulnerabilities

Microsoft has detected multiple zero-day exploits on the on-premises version of the Microsoft Exchange Server (2013,2016, and 2019). Microsoft attributes this campaign with high…

Subscribe to the weekly Cyber Threat Intelligence Brief

Thank you for your interest.You can download the report here.
A member of our team will be in touch with you shortly

Follow us on

Get updates from Atos Cybersecurity!

Sign up to receive the latest blogs from us

Thank you for your interest.You can download the report here.
A member of our team will be in touch with you shortly

Digital Security magazine

Cybersecurity solutions

Atos CyberSecurity solutions