Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 10 / 11
206 résultats taggé Microsoft  ✕
Large-Scale AiTM Attack targeting enterprise users of Microsoft email services https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services
03/08/2022 11:07:53
QRCode
archive.org
thumbnail

A ThreatLabz technical analysis of the latest variant of proxy-based AiTM attacks that are phishing enterprise users for their Microsoft credentials.

zscaler EN 2022 Microsoft AiTM adversary-in-the-middle phishing phishing-kits email
911 Proxy Service Implodes After Disclosing Breach https://krebsonsecurity.com/2022/07/911-proxy-service-implodes-after-disclosing-breach/
30/07/2022 13:20:59
QRCode
archive.org

911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the wake of a data breach that destroyed key components of its…

krebsonsecurity EN 2022 Microsoft 911 911re windows breach proxy service crime
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/?s=09
28/07/2022 00:40:38
QRCode
archive.org
thumbnail

MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and targeted attacks against European and Central American customers.

microsoft EN 2022 KNOTWEED 0day 0-day CVE-2022-22047 spyware PSOA
North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/
18/07/2022 21:15:49
QRCode
archive.org
thumbnail

A group of actors originating from North Korea that MSTIC tracks as DEV-0530 has been developing and using ransomware in attacks since June 2021. This group, which calls itself H0lyGh0st, utilizes a ransomware payload with the same name.

microsoft EN 2022 H0lyGh0st north-korea ransomware
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/
17/07/2022 21:33:46
QRCode
archive.org
thumbnail

A large-scale phishing campaign that attempted to target over 10,000 organizations since September 2021 used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and skip the authentication process, even if the user had enabled multifactor authentication (MFA).

microsoft EN 2022 phishing MFA AiTM hijack session
Ongoing phishing campaign can hack you even when you’re protected with MFA https://arstechnica.com/information-technology/2022/07/microsoft-details-phishing-campaign-that-can-hijack-mfa-protected-accounts/
17/07/2022 21:30:40
QRCode
archive.org
thumbnail

Campaign that steals email has targeted at least 10,000 organizations since September.

arstechnica EN 2022 phishing microsoft MFA campaign
Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706 - Microsoft Security Blog https://www.microsoft.com/security/blog/2022/07/13/uncovering-a-macos-app-sandbox-escape-vulnerability-a-deep-dive-into-cve-2022-26706/
13/07/2022 21:44:52
QRCode
archive.org
thumbnail

Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. We shared these findings with Apple, and fix for this vulnerability, now identified as CVE-2022-26706, was included in the security updates on May 16, 2022.

microsoft EN 2022 CVE-2022-26706 macOS Sandbox escape Apple
Cybersecurity experts question Microsoft's Ukraine report https://www.cyberscoop.com/cybersecurity-experts-question-microsofts-ukraine-report/
08/07/2022 09:12:07
QRCode
archive.org
thumbnail

Leading cybersecurity experts and foreign policy scholars raise serious questions and concerns about Microsoft's report on the Ukraine war.

Cyberscoop EN 2022 Microsoft report Russia-Ukraine-war
Microsoft finds Raspberry Robin worm in hundreds of Windows networks https://www.bleepingcomputer.com/news/security/microsoft-finds-raspberry-robin-worm-in-hundreds-of-windows-networks/
03/07/2022 12:03:15
QRCode
archive.org
thumbnail

Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors.

Bleepingcomputer EN 2022 Malware Microsoft Raspberry-Robin raspberryrobin USB Windows Worm Security Detection
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact https://securelist.com/the-sessionmanager-iis-backdoor/106868/
30/06/2022 22:25:26
QRCode
archive.org
thumbnail

In early 2022, we investigated an IIS backdoor called SessionManager. It has been used against NGOs, government, military and industrial organizations in Africa, South America, Asia, Europe, Russia and the Middle East.

securelist EN 2022 APT Backdoor Malware Microsoft Exchange Targeted IIS-attacks Vulnerabilities GELSEMIUM
NSA, Partners Recommend Properly Configuring, Monitoring PowerShell in New Report https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3069620/nsa-partners-recommend-properly-configuring-monitoring-powershell-in-new-report/utm_source/substack/utm_medium/nsa-partners-recommend-properly-configuring-monitoring-powershell-in-new-report/
25/06/2022 04:43:38
QRCode
archive.org
thumbnail

The National Security Agency (NSA) and partner cybersecurity authorities released a Cybersecurity Information Sheet today recommending that Microsoft Windows® operators and administrators properly

NSA en 2022 PowerShell recommandation information howto guidance Windows Microsoft
7-zip now supports Windows ‘Mark-of-the-Web’ security feature https://www.bleepingcomputer.com/news/microsoft/7-zip-now-supports-windows-mark-of-the-web-security-feature/
25/06/2022 04:39:28
QRCode
archive.org
thumbnail

7-zip has finally added support for the long-requested 'Mark-of-the-Web' Windows security feature, providing better protection from malicious downloaded files.

bleepingcomputer EN 2022 7-Zip Mark-of-the-Web MoTW Windows Microsoft
Defending Ukraine: Early Lessons from the Cyber War https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/
23/06/2022 07:03:23
QRCode
archive.org
thumbnail

This report represents research conducted by Microsoft’s threat intelligence and data science teams with the goal of sharpening our understanding of the threat landscape in the ongoing war in Ukraine. The report also offers a series of lessons and conclusions resulting from the data gathered and analyzed. Notably, the report reveals new information about Russian efforts including an increase in network penetration and espionage activities amongst allied governments, non-profits and other organizations outside Ukraine. This report also unveils detail about sophisticated and widespread Russian foreign influence operations being used among other things, to undermine Western unity and bolster their war efforts. We are seeing these foreign influence operations enacted in force in a coordinated fashion along with the full range of cyber destructive and espionage campaigns. Finally, the report calls for a coordinated and comprehensive strategy to strengthen collective defenses – a task that will require the private sector, public sector, nonprofits and civil society to come together. The foreword of this new report, written by Microsoft President and Vice Chair Brad Smith, offers additional detail below.

microsoft EN 2022 cyberwar Russia-Ukraine-war espionage report influence operations cyberoperations
FBI says fraud on LinkedIn a 'significant threat' to platform and consumers https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html
22/06/2022 08:48:54
QRCode
archive.org
thumbnail

Fraudsters who target LinkedIn users in sophisticated investment schemes pose a "significant threat" to the platform, the FBI tells CNBC.

cnbc EN 2022 LinkedIn fraud FBI Microsoft Cryptocurrency Politics
Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
07/06/2022 10:49:00
QRCode
archive.org

On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability.

Guidance CVE-2022-30190 mitigation Workarounds Vulnerability Microsoft EN 2022 Follina
CVE-2022-26925 : Patchez vos machines Windows sans attendre https://www.it-connect.fr/securite-cve-2022-26925-relais-ntlm-cette-vulnerabilite-touche-toutes-les-versions-de-windows/
11/05/2022 17:42:36
QRCode
archive.org
thumbnail

CVE-2022-26925 : Microsoft a corrigé une faille de sécurité zero-day qui touche toutes les versions de Windows et qui permet une attaque par relais NTLM.

it-connect FR NTLM active-directory microsoft windows entreprise CVE-2022-26925
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/
11/05/2022 11:25:36
QRCode
archive.org
thumbnail

Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert humane intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware-as-a-service affiliate model and disambiguate between the attacker tools and the various threat actors at play during a security incident.

microsoft ransomware Ransomware-as-a-service EN 2022 affiliate
Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/
06/05/2022 16:19:39
QRCode
archive.org
thumbnail

Faster, easier and more secure sign-ins will be available to consumers across leading devices and platforms  Mountain View, California, MAY 5, 2022  – In a joint effort to make the web […]

FIDO fidoalliance EN 2022 Google Apple Microsoft Passwordless password Standard
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
27/04/2022 10:53:04
QRCode
archive.org
thumbnail

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could allow attackers to achieve greater impact on vulnerable devices by deploying payloads and performing other malicious actions via arbitrary root code execution.

Nimbuspwn microsoft EN 2022 CVE-2022-29799 CVE-2022-29800 vulnerability Linux D-Bus TOCTOU networkd-dispatcher
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/
24/04/2022 10:58:21
QRCode
archive.org
thumbnail

In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.

microsoft 2021 LemonDuck lemoncat EN malware botnet infrastructure
page 10 / 11
4582 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio