1704795979 Cybersecurity Instructions for a war that has become global and

Cybersecurity: Instructions for a war that has become global and merciless – L'Usine Nouvelle

The Internet is revolutionary in many ways, and it also offers the espionage industry new techniques that allow cybercriminals to operate with complete discretion.

It can all start with an initial reconnaissance phase, sending a booby-trapped email to targets, or exploiting vulnerabilities. Once that first foot is in the door, the attackers will not immediately go to the hotspot, “but rather move from PC to PC without immediately exfiltrating the data.” They may even remain inactive for several years, since the goal is to do so for that long “To remain as unnoticed as possible in the system,” describes Gérôme Billois, partner and cybersecurity expert at Wavestone.

Infiltration can occur through both cyber and physical means, as evidenced by Livia Tibirna, analyst at cybersecurity startup Sekoia.io, who has observed employee corruption on the dark web in attacked companies. Regardless of the access route, these breaches are generally less visible than classic cybercrime: “The company sometimes discovers them without knowing exactly what happened or who recovered its data.” In other cases, it is the secret services that raise the alarm. In general, companies communicate little about these attacks,” says Erwan Keraudy, managing director of CybelAngel, a start-up specializing in data leaks. The impact of such revelations on the image is in question as negative.

[…]

This article is reserved for our L'Usine Nouvelle subscribers

Support specialist journalism.

Already subscribed?
Registration

YOUR HINTS

source
Indices and prices

Selected to you

Akidaia, an unconnected access control system