Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 10 / 41
817 résultats taggé 2022  ✕
Malware on the Google Play store leads to harmful phishing sites https://www.malwarebytes.com/blog/news/2022/11/malware-on-the-google-play-store-leads-to-harmful-phishing-sites
03/11/2022 08:11:18
QRCode
archive.org
thumbnail

A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads.

Older versions of these apps have been detected in the past as different variants of Android/Trojan.HiddenAds. Yet, the developer is still on Google Play dispensing its latest HiddenAds malware.

malwarebytes Mobile-apps-Group EN 2022 HiddenAds malware Trojan app google-play
U.S. banks processed about $1.2 billion in ransomware payments in 2021 https://www.cnbc.com/2022/11/01/us-banks-process-roughly-1point2-billion-in-ransomware-payments-in-2021.html
03/11/2022 07:10:37
QRCode
archive.org
thumbnail
  • U.S. banks and financial institutions processed more than $1 billion in potential ransomware-related payments in 2021.
  • It’s a new record and almost triple the amount that was reported the previous year.
  • Over half the ransomware attacks are attributed to suspected Russian cyber hackers, according to a new report.
cnbc EN 2022 ransomware financial banks record ransomware-related payments 2021
Nothing PUNY About OpenSSL (CVE-2022-3602) https://www.splunk.com/en_us/blog/security/nothing-puny-about-cve-2022-3602.html
02/11/2022 21:15:58
QRCode
archive.org
thumbnail

The Splunk SURGe team shares an outline of their interpretation of the CVE-2022-3602 vulnerability and what you can do to detect it in your environment.

splunk EN 2022 CVE-2022-3602 OpenSSL punycode
Phylum Discovers Dozens More PyPI Packages Attempting to Deliver W4SP Stealer in Ongoing Supply-Chain Attack https://blog.phylum.io/phylum-discovers-dozens-more-pypi-packages-attempting-to-deliver-w4sp-stealer-in-ongoing-supply-chain-attack
02/11/2022 21:03:04
QRCode
archive.org
thumbnail

Last week, our automated risk detection platform alerted us to suspicious activity in dozens of newly published PyPI packages. Here's what we uncovered.

Phylum EN 2022 supplychain PyPI W4SP Stealer Attack
New Azov data wiper tries to frame researchers and BleepingComputer https://www.bleepingcomputer.com/news/security/new-azov-data-wiper-tries-to-frame-researchers-and-bleepingcomputer/
02/11/2022 10:06:45
QRCode
archive.org
thumbnail

A new and destructive 'Azov Ransomware' data wiper is being heavily distributed through pirated software, key generators, and adware bundles, trying to frame well-known security researchers by claiming they are behind the attack.

EN bleepingcomputer 2022 Azov-Ransomware researchers BleepingComputer Data-Wiper Security-Researcher Ukraine
Unmasking WindTape - Speaker Deck https://speakerdeck.com/patrickwardle/unmasking-windtape
02/11/2022 09:12:22
QRCode
archive.org
thumbnail

The offensive macOS cyber capabilities of the WINDSHIFT APT group provide us with the opportunity to gain insight into the Apple-specific approaches employed by an advanced adversary.

In this talk we’ll comprehensively dissect OSX.WindTape, a second-stage tool utilized by the WINDSHIFT APT group when targeting Apple systems.

First we’ll discuss the malware’s anti-analysis mechanisms, and then once these have been thwarted, we’ll explore its capabilities. To conclude, we’ll present heuristic methods that can generically both detect and prevent WindTape, as well as other advanced macOS threats.

patrickwardle EN 2022 WINDSHIFT APT macOS
How we handled a recent phishing incident that targeted Dropbox https://dropbox.tech/security/a-recent-phishing-campaign-targeting-dropbox
02/11/2022 07:00:10
QRCode
archive.org
thumbnail

We were recently the target of a phishing campaign that successfully accessed some of the code we store in GitHub. No one’s content, passwords, or payment information was accessed, and the issue was quickly resolved. Our core apps and infrastructure were also unaffected, as access to this code is even more limited and strictly controlled. We believe the risk to customers is minimal. Because we take our commitment to security, privacy, and transparency seriously, we have notified those affected and are sharing more here.

dropbox EN 2022 incident phishing GitHub
Banking Trojan Techniques: Financially Motivated Malware https://unit42.paloaltonetworks.com/banking-trojan-techniques/
01/11/2022 20:47:57
QRCode
archive.org

Understanding banking Trojan techniques can help detect other activities of financially motivated threat groups.

unit42 EN 2022 paloaltonetworks research Banking Trojan Techniques
Fodcha Is Coming Back, Raising A Wave of Ransom DDoS https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/
01/11/2022 20:46:08
QRCode
archive.org

Background
On April 13, 2022, 360Netlab first disclosed the Fodcha botnet. After our
article was published, Fodcha suffered a crackdown from the relevant
authorities, and its authors quickly responded by leaving "Netlab pls leave me
alone I surrender" in an updated sample.No surprise, Fodcha's authors didn't
really stop updating after the fraudulent surrender, and soon a new version was
released.

In the new version, the authors of Fodcha redesigned the communication protocol
and started to us

netlab360 EN 2022 Fodcha botnet DDoS
Liz Truss's personal phone was hacked by Putin's spies for top messages | Daily Mail Online https://www.dailymail.co.uk/news/article-11368619/Liz-Trusss-personal-phone-hacked-Putins-spies-secret-details-negotiations.html
31/10/2022 21:43:58
QRCode
archive.org

One source said that the phone was so heavily compromised that it has now been placed in a locked safe inside a secure Government location.

dailymail EN 2022 Truss phone compromised spy Russia England Government
Dormant Colors browser hijackers could be used for more nefarious tasks, report says https://www.malwarebytes.com/blog/news/2022/10/report-popular-yet-harmful-browser-hijackers-could-be-used-for-more-nefarious-tasks
31/10/2022 21:31:30
QRCode
archive.org
thumbnail

Dormant Colors, a browser extension campaign, was spotted stealing browser data and hijacking search results and affiliation to thousands of sites.

malwarebytes EN 2022 browser campaign extension hijackers
interview Lockbit administrator https://papers.vx-underground.org/papers/Other/Interviews/LB0-10-30.html?s=09
30/10/2022 16:46:26
QRCode
archive.org
  • In this interview this person will be identified as LB0 (Lockbit administrator, founding member)
  • vx-underground conducted this interview over TOX
    • Text and grammar has been modified to improve legibility
vx-underground EN 2022 interview Lockbit administrator
The Hunt for the Kingpin Behind AlphaBay, Part 1: The Shadow | WIRED https://www.wired.com/story/alphabay-series-part-1-the-shadow/
30/10/2022 11:58:19
QRCode
archive.org
thumbnail

It was the largest dark-web drug and crime bazaar in history, run by a technological mastermind who seemed untouchable—until his tech was turned against him.

wired EN 2022 alphabay dark-web crime fbi darkweb
Inside TheTruthSpy, the stalkerware network spying on thousands • TechCrunch https://techcrunch.com/2022/10/26/inside-thetruthspy-stalkerware/
28/10/2022 23:51:46
QRCode
archive.org
thumbnail

Leaked data obtained by TechCrunch reveals the notorious network of Android spyware apps tracked locations and recorded calls of Americans.

techcrunch EN 2022 stalkerware android mobile-spyware wiretapping US privacy
What is ransomware-as-a-service and how is it evolving? https://www.malwarebytes.com/blog/business/2022/10/what-is-ransomware-as-a-service-and-how-is-it-evolving
28/10/2022 23:18:18
QRCode
archive.org
thumbnail

Ransomware attacks are becoming more frequent and costlier—breaches caused by ransomware grew 41 percent in the last year, the average cost of a destructive attack rising to $5.12 milllion. What’s more, a good chunk of the cyber criminals doing these attacks operate on a ransomware-as-a-service (RaaS) model.

malwarebytes EN 2022 ransomware-as-a-service RaaS
EDR: Detections, Bypassess and other Shenanigans https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans
28/10/2022 23:17:24
QRCode
archive.org

EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.

fourcore EN 2022 EDR Detections Bypassess Endpoint Detection Response
Incident Report: Employee and Customer Account Compromise https://www.twilio.com/blog/august-2022-social-engineering-attack
28/10/2022 09:02:19
QRCode
archive.org
thumbnail

On August 4, 2022, Twilio identified accounts of employees who were compromised by a social engineering attack. The attacker then gained access to data for a limited number of customers.

Twilio EN 2022 compromised postmortem
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity https://www.microsoft.com/en-us/security/blog/2022/10/27/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity/
28/10/2022 09:01:26
QRCode
archive.org

Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread.

microsoft EN 2022 Raspberry-Robin malware ecosystem FakeUpdates DEV-0651
SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri https://rambo.codes/posts/2022-10-25-sirispy-ios-bug-allowed-apps-to-eavesdrop
27/10/2022 08:06:40
QRCode
archive.org
thumbnail

Any app with access to Bluetooth could record your conversations with Siri and audio from the iOS keyboard dictation feature when using AirPods or Beats headsets. This would happen without the app requesting microphone access permission and without the app leaving any trace that it was listening to the microphone.

rambo.codes EN 2022 iOS bug Siri SiriSpy Bluetooth AirPods privacy
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company https://www.trendmicro.com/en_us/research/22/j/lv-ransomware-exploits-proxyshell-in-attack.html
26/10/2022 20:19:52
QRCode
archive.org
thumbnail

Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion analysis standpoint

trendmicro EN 2022 ProxyShell endpoints targeted-attacks ransomware research APT REvil Sodinokibi
page 10 / 41
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio