Welcome in Yuno

Modified on Tue, 13 Feb at 5:24 PM

In this article, find out more about Yuno, its cyber watch philosophy and its mission.

SUMMARY


What is Yuno?

Created in 2004, Yuno is XMCO's cyber watch service. Every day, our watchers carry out an in-depth cyber watch of the various threats that could impact your IS, and send you a summary of their investigations in bulletins designed to give you the essential information.
Thus, while our customers used to spend between one and two hours a day on cyber watch, our users know the essentials of the threats that could impact their IS in just ten minutes a day.



Our mission: To take on the burden of your cyber watch so that you can concentrate on what's important - keeping your IS secure


Every day, our watchers analyze, cross-check, verify and summarize actionable recommendations on cyber threats.



Content adapted to your needs:

Yuno's content is designed to address the three issues that cyber watch is supposed to be able to address:


Technical Bulletins - operational content dedicated to the technical security of information systems:


Technical bulletins are written by CERT-XMCO consultants with a technical background, as well as XMCO's pentest teams. They aim to provide a precise characterization of a vulnerability, its criticality and how it works. There are 3 types of technical bulletins:


  • The VULN bulletin: this is a bulletin issued when a vulnerability is addressed for the first time by Yuno and has not yet been patched.
  • The PATCH bulletins: these are issued when a patch is released to correct a technical vulnerability.    
  • The EXPLOIT bulletin: this is a bulletin written to analyze an exploit code or a POC used to exploit a technical vulnerability.


Info Bulletins - operational content dedicated to the study of cyber threat actors:


The bulletins are written by CERT-XMCO's CTI (CyberThreat Intelligence) consultants. They aim to study the different groups of attackers evolving in the cyber space, their methods, their victimologies and their exploitation of the latest vulnerabilities.

We also provide you with Indicators of Compromise (IoC), which can be used as input for your various detection tools.



XMCO Bulletins - strategic content dedicated to raising teams' awareness of cybersecurity :


XMCO bulletins can be written by CERT-XMCO technical or CTI consultants. This content is intended to provide a more global analysis, identifying the major trends in the cyber ecosystem. This content is intended to be accessible to a public new to cybersecurity and can therefore serve as a basis for raising awareness of cybersecurity issues.


NB: The Info and XMCO bulletins form what is known as the environmental cyber watch (as opposed to technical cyber watch)


Important information at a glance:


Each bulletin follows a standardized format and vocabulary so that you can quickly find the information you need to make the right decision:


For a technical bulletin :



  1. The type of bulletin
  2. The criticality of the bulletin
  3. Damage caused by the vulnerability
  4. The type of exploitation of the vulnerability addressed    
  5. The versions affected by the vulnerability


For an environmental bulletin (info/XMCO) :



  1. The type of bulletin
  2. The themes covered by the content (by region, by type of threat, by actor's motivation, etc.)
  3. Criticality of the bulletin    
  4. Potential IoC

NB: To find out more about what goes into a Yuno newsletter, go to the page Understanding a Yuno bulletin.


Content adapted to different time-frames:

Although we write content every day, the pace of publication varies according to the purpose of the content:


SMS: quick information in case of emergency


When we learn of a new vulnerability that turns out to be extremely critical, we can warn you via SMS.

You can activate this option by following the instructions on this page.



Daily bulletins: the compromise between hindsight and responsiveness


Publication schedule: every day between 2 p.m. and 4 p.m. (GMT+1).

This is the majority of the bulletins we publish. Every morning, our watchers process the vulnerabilities/current events that appeared the day before or even the same day.


Weekly content: taking a step back, analyzing


Publication schedule: every Friday between 2 p.m. and 4 p.m. (GMT+1).

We publish some content every Friday. These bulletins are often XMCO bulletins, which aim to provide a summary of the week's events or go into more depth on a specific event.



Publication schedule: 1st week of each month between 2pm and 4pm (GMT+1).

This content focuses more on statistics and underlying trends. For example, we offer a 'ransomware observatory' that looks at ransomware victims over the last month.



Content tailored to the way you consume information


Once our content has been written, it is made available to you through several channels. It's up to you to choose the one(s) that suits you best:


Consult your cyber watch from lePortail


All the content written for Yuno is available on our SaaS platform lePortail.


Check your cyber watch in your inbox


Every day we send you the bulletins that apply to you to the e-mail address you used to create your account. You can choose to receive :

  • All the content in a single email called the daily summary    
  • All content in separate emails


Reintegrate cyber watch into your ecosystem using our API


All our content can be accessed and queried via our API. You can find out more about how our API works here.


NB: our API is currently in pull mode only.



Go beyond cyber watch with lePortail

Yuno provides you with tools that allow you to go beyond cyber watch to keep your information system secure:


Follow up and organize your remediation with action plans


For each bulletin impacting your IS, an action ticket is created within the action plans. These action tickets are used to monitor the application of corrective measures affecting your IS.

You can find more information on tickets and action plans on this page.


Find out more about a CVE with the CVE database

Every day, we synchronize thePortal with the NIST CVE database to bring you the latest CVEs discovered by publishers. You will also find associated Yuno content that we have published concerning these vulnerabilities.

Visit the CVE Database page to find out more.


Consult the history of our bulletins since 2004 with the XMCO database


By logging on to the Portal, you will have access to all the content published by Yuno since its creation in 2004. You can consult a previously published bulletin, or even forward it to one of your colleagues!

Want to find out more about the XMCO database? All the information you need is available here.



Getting started!


First Yuno user in your company?


Once your account has been activated (you should have received an email asking you to choose a password for your account), you can already take advantage of the features of our lePortail platform.

If you would like to take advantage of a personalized cyber watch or integrate other collaborators, a quick set-up is required. You'll find all the necessary steps in the "Setup Yuno in a few clicks" section of this wiki.



One of your colleagues has added you to Yuno?


Create a password for your lePortail account to take advantage of the SaaS platform. You can visit the "setting up reception of the cyber watch" page to start receiving a cyber watch tailored to your needs.


Whatever your situation is, we're delighted to count you among our users!

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article