Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 103 / 236
Chinese Keyboard App Vulnerabilities Explained https://citizenlab.ca/2024/04/chinese-keyboard-app-vulnerabilities-explained/
26/04/2024 08:19:43
QRCode
archive.org
thumbnail

We analyzed third-party keyboard apps Tencent QQ, Baidu, and iFlytek, on the Android, iOS, and Windows platforms. Along with Tencent Sogou, they comprise over 95% of the market share for third-party keyboard apps in China. This is an FAQ for the full report titled "The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers."

citizenlab EN 2024 Chinese Keyboard App Vulnerabilities Tencent Baidu Android iOS
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
26/04/2024 08:06:18
QRCode
archive.org
thumbnail

ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns.

talosintelligence EN 2024 ArcaneDoor perimeter-network CVE-2024-20353 CVE-2024-20359
Unplugging PlugX: Sinkholing the PlugX USB worm botnet https://blog.sekoia.io/unplugging-plugx-sinkholing-the-plugx-usb-worm-botnet/
26/04/2024 08:01:32
QRCode
archive.org
thumbnail

Learn about our process for collecting telemetry data from PlugX worm-infected workstations, as well as how to disinfect them.
#2024 #EN #PlugX #Sinkhole #USB #botnet #sekoia #worm

botnet Sinkhole sekoia USB worm PlugX EN 2024
France seeks new EU sanctions to target Russian disinformation https://therecord.media/france-eu-sanctions-proposal-russian-information-operations-elections?_hsenc=p2ANqtz-9ZRh_LxIGk-rMqKYCg78ivaoyQKxTXZMxKS6zFhHE23WtiNcBy7dleGa0TbYgFL1rpjQL5oOpDXN9F40GyTOtx9z6ltA&_hsmi=304180256
25/04/2024 07:50:31
QRCode
archive.org
thumbnail

A draft proposal, offered ahead of European elections in June, reportedly would allow the EU to impose tougher restrictions on individuals and entities involved in Russia-backed influence operations worldwide.

therecord EN 2024 Policy EU France disinformation Russia
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks https://www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
25/04/2024 07:48:55
QRCode
archive.org
thumbnail

Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances.

wired EN 2024 0-day vulnerabilities security cisco cybersecurity china hacking ArcaneDoor
LOCKBIT Black's Legacy: Unraveling The DragonForce Ransomware Connection - Cyble https://cyble.com/blog/lockbit-blacks-legacy-unraveling-the-dragonforce-ransomware-connection/
24/04/2024 14:34:19
QRCode
archive.org
thumbnail

CRIL investigates DragonForce Ransomware and its links to a leaked LOCKBIT Builder.

cyble EN 2024 DragonForce Ransomware LOCKBIT Builder
 The LockBit’s Attempt to Stay Relevant, Its Imposters and New Opportunistic Ransomware Groups https://www.trellix.com/en-ca/blogs/research/the-lockbit-name-is-back-along-with-its-imposters-and-new-opportunistic-ransomware-groups/
24/04/2024 12:32:13
QRCode
archive.org

The Trellix Advanced Research Center has recently observed an uptick of LockBit-related cyber activity surrounding vulnerabilities in ScreenConnect. This surge suggests that despite the Law Enforcement's (LE) "Operation Cronos" aimed at dismantling LockBit's infrastructure, the ransomware operators somehow managed to survive and stay a float. It appears that the cybercriminals group behind LockBit ransomware partially restored their infrastructure and created an impression that the LE actions did not affect their normal operation. Concurrently, alongside the resurgence of LockBit's exploitation of ScreenConnect vulnerabilities, we have seen other threat actors have either impersonated LockBit ransomware or incorporated LockBit into their own cyber attack campaigns.

Trellix EN 2024 LockBit-related LockBit campaigns ransomware LockBitSupp
Advanced Cyber Threats Impact Even the Most Prepared https://medium.com/mitre-engenuity/advanced-cyber-threats-impact-even-the-most-prepared-56444e980dc8
24/04/2024 12:30:44
QRCode
archive.org

Foreign nation-state cyber adversaries are tenacious. Their attacks are evolving to get around the industry’s most sophisticated defenses. Last year was exploitation of routers, and this year’s theme has been compromise of edge protection devices.

MITRE, a company that strives to maintain the highest cybersecurity possible, is not immune.

Despite our commitment to safeguarding our digital assets, we’ve experienced a breach that underscores the nature of modern threats. In this blog post, we provide an initial account of the incident, outlining the tactics, techniques, and procedures (TTPs) employed by the adversaries, as well as some of our ongoing incident response efforts and recommendations for future steps to fortify your defenses.

medium EN 2024 MITRE cyberincident Ivanti TTPs
Kapeka: A novel backdoor spotted in Eastern Europe https://labs.withsecure.com/publications/kapeka
24/04/2024 12:15:06
QRCode
archive.org
thumbnail

This report provides an in-depth technical analysis of the backdoor and its capabilities, and analyzes the connection between Kapeka and Sandworm group. The purpose of this report is to raise awareness amongst businesses, governments, and the broader security community. WithSecure has engaged governments and select customers with advanced copies of this report. In addition to the report, we are releasing several artifacts developed as a result of our research, including a registry-based & hardcoded configuration extractor, a script to decrypt and emulate the backdoor’s network communication, and as might be expected, a list of indicators of compromise, YARA rules, and MITRE ATT&CK mapping

withsecure EN 2024 Kapeka analysis Sandworm
GreyNoise Labs - Decrypting FortiOS 7.0.x https://www.labs.greynoise.io/grimoire/2024-04-23-decrypting-fortios/
24/04/2024 10:04:20
QRCode
archive.org
thumbnail

This article steps through decrypting FortiGate FortiOS 7.0.x firmware.

greynoise EN 2024 Decrypting FortiOS
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining - Avast Threat Labs https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus-updates-for-distributing-backdoors-and-casual-mining/
23/04/2024 13:39:01
QRCode
archive.org
thumbnail

Avast discovered and analyzed GuptiMiner, a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers.

avast EN 2024 GuptiMiner: research Hijacking Antivirus Updates
Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability https://www.securityweek.com/siemens-industrial-product-impacted-by-exploited-palo-alto-firewall-vulnerability/
23/04/2024 13:06:28
QRCode
archive.org

The recently disclosed Palo Alto Networks firewall vulnerability tracked as CVE-2024-3400, which has been exploited in attacks for at least one month, has been found to impact one of Siemens’ industrial products.

In an advisory published late last week, Siemens revealed that its Ruggedcom APE1808 devices configured with a Palo Alto Networks virtual next-generation firewall (NGFW) could be affected by CVE-2024-3400.

securityweek EN 2024 CVE-2024-3400 Palo Alto Networks firewall Siemens IoT
How a Massive Hack of Psychotherapy Records Revealed a Nation’s Secrets https://www.bloomberg.com/news/features/2024-04-22/a-massive-therapy-hack-shows-just-how-unsafe-patients-files-can-be?leadSource=uverify%20wall
23/04/2024 11:28:26
QRCode
archive.org
thumbnail

Aleksanteri Kivimäki was a hacker wunderkind with a mean streak. Now he’s on trial for the largest crime in Finland’s history.

bloomberg EN 2024 Criminal Finland Kivimäki
CVE-2024-20356: a Cisco appliance to run DOOM https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/
23/04/2024 11:07:42
QRCode
archive.org
thumbnail

Exploiting remote code execution in Cisco's CIMC management system and jailbreaking the device to run untrusted code

nettitude EN 2024 CVE-2024-20356 DOOM Jailbreaking CIMC analysis
DDoS platform shut down by international law enforcement agencies https://www.heise.de/en/news/DDoS-platform-shut-down-by-international-law-enforcement-agencies-9691209.html
23/04/2024 10:35:42
QRCode
archive.org
thumbnail

International law enforcement authorities have shut down a DDoS-as-a-service platform and seized its domain.

heise EN 2024 Beschlagnahme Cybercrime DDoS DDoS-as-a-service PowerOFF Security stresser.tech
Le système informatique de Volkswagen gravement piraté en 2015, probablement par des cyber-espions chinois https://www.rtbf.be/article/le-systeme-informatique-de-volkswagen-gravement-pirate-en-2015-probablement-par-des-cyber-espions-chinois-11361944
23/04/2024 10:27:43
QRCode
archive.org
thumbnail

Le système informatique mondial de Volkswagen, le plus grand constructeur automobile européen, a été piraté il y a...

rtbf FR 2024 Volkswagen 20§5 piratage data-breach Chine espions
Hackers Broke Into Change Healthcare’s Systems Days Before Cyberattack https://www.wsj.com/articles/change-healthcare-hackers-broke-in-nine-days-before-ransomware-attack-7119fdc6?st=f8jgsar36jvj533
23/04/2024 07:48:39
QRCode
archive.org

UnitedHealth Group paid ransom to hackers, person familiar with the cyber investigation says

wsj EN 2024 change-healthcare UnitedHealth Cyberattack intrusion
Microsoft: APT28 hackers exploit Windows flaw reported by NSA https://www.bleepingcomputer.com/news/security/microsoft-apt28-hackers-exploit-windows-flaw-reported-by-nsa/#google_vignette
22/04/2024 20:08:32
QRCode
archive.org
thumbnail

Microsoft warns that the Russian APT28 threat group exploits a Windows Print Spooler vulnerability to escalate privileges and steal credentials and data using a previously unknown hacking tool called GooseEgg.
#APT28 #Computer #Credential #Escalation #Exploit #GooseEgg #InfoSec #NSA #Print #Privilege #Security #Spooler #Theft #Windows

bleepingcomputer EN 2024 NSA Spooler Print Theft Escalation Credential Windows Privilege GooseEgg Exploit APT28
Le groupe Swisspro victime d'une attaque par ransomware https://www.ictjournal.ch/news/2024-04-22/le-groupe-swisspro-victime-dune-attaque-par-ransomware
22/04/2024 13:52:53
QRCode
archive.org
thumbnail

Les sociétés Swisspro appartenant à BKW Building Solutions ont été la cible d'une attaque par ransomware.

ictjournal FR CH 2024 Swisspro cyberattaque
Unauthenticated function injection vulnerability in WordPress Shortcode Addons plugin (unpatched). – NinTechNet https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-in-wordpress-shortcode-addons-plugin-unpatched/
22/04/2024 06:54:05
QRCode
archive.org
thumbnail

The WordPress Shortcode Addons plugin version 3.2.5 and below is prone to an unauthenticated function injection vulnerability.

nintechnet EN 2024 WordPress Shortcode Addons plugin vulnerability
page 103 / 236
4706 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio