Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | Pardot Privacy Policy | Oktopost Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Security Dive

Security countdown to 2023

2

Win the Cyber race

3

Cyber Tech Radar 2022

4

Tips for Data Privacy

5

Quantum-safe encryption

6

PQC algorithms: what’s the odd one out?

New articles!

Articles

December 16, 2021

Surge in malware loaders activity, a dangerous trend before the Christmas Holidays

Landing PageSecurity DiveThreat research

Surge in malware loaders activity A dangerous trend before the Christmas Holidays The Christmas Holidays are almost upon as. We…

December 13, 2021

Log4Shell - Unauthenticated RCE 0-day exploit

Landing PageThreat research

Log4Shell – Unauthenticated RCE 0-day exploit (CVE-2021-44228) In this blog, we provide background on Log4Shell vulnerability (CVE-2021-44228), detection guidance and we recommend mitigations. Vulnerability info Key…

December 7, 2021

External remote services attacks

Landing PageSecurity DiveThreat research

External remote services attacks How to stop one of today’s most common intrusion methods? Cybersecurity incidents are on the rise.[1] 64% of companies have suffered at least one incident. Ransomware grew by…

November 4, 2021

BlackMatter ransomware

Landing PageSecurity DiveThreat research

Introduction Atos Digital Security regularly performs incident response and gathers information on various groups of attackers. Among them, BlackMatter stands out for its remarkably rapid rise despite its recent inception. This new group of attackers…

October 29, 2021

Cloud attacks: How to secure a growing threat vector

Landing PageThreat research

Cloud attacks: How to secure a growing threat vector   The cloud is a double-edged sword. On the one hand, organizations have used the…

October 26, 2021

Vertical specialized attacks- industry

Landing PageSecurity DiveThreat research

Vertical-specialized attacks: how to stay safe when your industry is under attack Cybersecurity has always been complex. These unique security challenges come from many places — your products, your digital…

September 30, 2021

Discovering Potentially Abusable Binaries with streamlined PE Import Table searching

Landing PageSecurity DiveThreat researchVulnerabilities

Introduction I decided to put this blog post together only to share a simple idea which could potentially be useful or inspirational to…

September 17, 2021

Phishing campaign using HTML Smuggling to get your Office365 credentials

Landing PageSecurity DiveThreat research

Threat Actors constantly evolve in their campaigns to be more successful as security tools are getting better and well-trained employees are more vigilant…

June 7, 2021

Avaddon Ransomware Analysis

Landing PageSecurity DiveThreat research

Atos Digital Security regularly performs incident response and gather information on various attacker groups. Among them, Avaddon stands out for its modus operandi and its rise.

Subscribe to the weekly Cyber Threat Intelligence Brief

Thank you for your interest. You can download the report here.
A member of our team will be in touch with you shortly

Follow us on

Digital Security magazine

Cybersecurity solutions

Atos CyberSecurity solutions