Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 106 / 223
4446 résultats taggé E*N  ✕
Google shares update on passkeys and new ways to protect accounts https://blog.google/technology/safety-security/google-passkeys-update-april-2024/
03/05/2024 09:07:42
QRCode
archive.org
thumbnail

For World Password Day, we’re sharing updates to passkeys across our products and sharing more ways we’re keeping people safe online.

google EN 2024 passkeys Password
Marriott admits it falsely claimed for five years it was using encryption during 2018 breach | CSO Online https://www.csoonline.com/article/2096365/marriott-admits-it-falsely-claimed-for-five-years-it-was-using-encryption-during-2018-breach.html
03/05/2024 09:05:47
QRCode
archive.org
thumbnail

Marriot revealed in a court case around a massive 2018 data breach that it had been using secure hash algorithm 1 and not the much more secure AES-1 encryption as it had earlier maintained.

csoonline EN 2024 lie Marriot 2018 data-breach encryption
Analysis of TargetCompany's Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware) https://asec.ahnlab.com/en/64921/
03/05/2024 08:42:00
QRCode
archive.org
thumbnail

While monitoring attacks targeting MS-SQL servers, AhnLab SEcurity intelligence Center (ASEC) recently identified cases of the TargetCompany ransomware group installing the Mallox ransomware. The TargetCompany ransomware group primarily targets improperly managed MS-SQL servers to install the Mallox ransomware. While these attacks have been ongoing for several years, here we will outline the correlation between the newly identified malware and previous attack cases involving the distribution of the Tor2Mine CoinMiner and BlueSky ransomware.

asec.ahnlab EN 2024 MS-SQL servers CoinMiner BlueSky ransomware analysis
New “Goldoon” Botnet Targeting D-Link Devices https://www.fortinet.com/blog/threat-research/new-goldoon-botnet-targeting-d-link-devices
03/05/2024 08:38:05
QRCode
archive.org
thumbnail

FortiGuard Labs discovered the new botnet “Goldoon” targeting D-Link devices through related vulnerability CVE-2015-2051.

fortinet EN 2024 Research FortiGuard Threat botnet Labs Goldoon D-Link CVE-2015-2051
Operation PANDORA shuts down 12 phone fraud call centres https://www.europol.europa.eu/media-press/newsroom/news/operation-pandora-shuts-down-12-phone-fraud-call-centres
03/05/2024 08:03:38
QRCode
archive.org
thumbnail

Operation PANDORA started with a bank teller in Freiburg, Germany. When in December 2023 a customer asked to withdraw over EUR 100 000 in cash, the bank teller grew suspicious and quickly learned the customer had fallen victim to a ‘fake police officer scam’. He informed the real police, which prevented the victim from handing the money over to the...

Europol EN 2024 Op-Pandora PANDORA phone-scam fraud scam arrested
Op Pandora puts suspected phone fraudsters back in the box https://www.theregister.com/2024/05/03/operation_pandora_europol/
03/05/2024 08:02:30
QRCode
archive.org
thumbnail

Cops prevented crims from bilking victims out of more than €10m - but couldn't stop crime against art

theregister EN 2024 Europol Op-Pandora fraudsters phone-scam
Eight Arms to Hold You: The Cuttlefish Malware https://blog.lumen.com/eight-arms-to-hold-you-the-cuttlefish-malware/?ref=news.risky.biz
03/05/2024 07:43:56
QRCode
archive.org
thumbnail

Executive Summary: The Black Lotus Labs team at Lumen Technologies is tracking a malware platform we’ve named Cuttlefish, that targets networking equipment, specifically enterprise-grade small office/home office (SOHO) routers. This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent local area network (LAN). A

lumen EN 2024 Cuttlefish Malware SOHO routers DNS-hijacking sniffing iot
Hacker free-for-all fights for control of home and office routers everywhere https://arstechnica.com/security/2024/05/hacker-free-for-all-fights-for-control-of-home-and-office-routers-everywhere/
03/05/2024 07:42:41
QRCode
archive.org
thumbnail

How and why nation-state hackers and cybercriminals coexist in the same router botnet.

arstechnica EN 2024 SOHO routers home IoT APT PawnStorm MooBot
macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown  https://www.sentinelone.com/blog/macos-adload-prolific-adware-pivots-just-days-after-apples-xprotect-clampdown/
02/05/2024 13:44:31
QRCode
archive.org
thumbnail

Learn about the latest Adload adware variants, written in Go and intended to bypass Apple's recent XProtect updates.

sentinelone EN 2024 macOS Adload Apple
French hospital CHC-SV refuses to pay LockBit extortion demand https://www.bleepingcomputer.com/news/security/french-hospital-chc-sv-refuses-to-pay-lockbit-extortion-demand/
02/05/2024 08:50:26
QRCode
archive.org
thumbnail

The Hôpital de Cannes - Simone Veil (CHC-SV) in France announced it received a ransom demand from the Lockbit 3.0 ransomware gang, saying they refuse to pay the ransom.

bleepingcomputer EN 2024 CHC-SV France Healthcare Hospital LockBit LockBit-3.0 Ransomware
Microsoft needs to win back trust https://www.theverge.com/2024/4/25/24139914/microsoft-cyber-security-incidents-trust-report
02/05/2024 08:12:13
QRCode
archive.org
thumbnail

Microsoft has faced a series of security issues in recent years. Now, the company is trying to win back trust and focus on security as a top priority.

theverge EN 2024 trust Microsoft security issues
Unveiling the depths of residential proxies providers https://www.orangecyberdefense.com/be/blog/unveiling-the-depths-of-residential-proxies-providers
01/05/2024 11:03:39
QRCode
archive.org

Analysts from Sekoia.io and Orange Cyberdefense delve into the phenomenon of RESIP, explore the actual market landscape, which is composed of multiple shady providers, and explain how cyber threat actors abuse or even directly provide such services.

orangecyberdefense EN 2024 analysis residential proxies providers
Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams https://jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/
01/05/2024 09:38:21
QRCode
archive.org
thumbnail

Attackers are using Docker Hub for malicious campaigns of various types, including spreading malware, phishing and scams. Read the analysis of 3 malware campaigns.

jfrog EN 2024 Docker Hub Repositories Malware Phishing
Baltic countries blame Russia for GPS jamming of commercial flights https://therecord.media/baltic-countries-blame-russia-gps-jamming-airline-flights?_hsenc=p2ANqtz-9Eg153mwXs1WkKqs_CGZhkTgfYRyHU9C0g-m1OtwqC88IogLCyL4ldKJY-f_CJmIXMgsaK8TwCwjlfeMfS_9Mnm-hSEA
01/05/2024 09:27:46
QRCode
archive.org
thumbnail

State officials from Lithuania and Estonia are among those raising the alarm about Russian interference with navigation signals.

therecord EN 2024 GPS jamming EU Russia Lithuania Estonia
Vastaamo hack: Therapy notes hacker jailed for blackmail https://www.bbc.com/news/articles/c97znd00q7mo
01/05/2024 06:45:09
QRCode
archive.org
thumbnail

Julius Kivimäki threatened thousands of patients he would publish details of their therapy sessions.

bbc EN 2024 Vastaamo hacker blackmail Finland Kivimäki
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware https://blog.kandji.io/malware-cuckoo-infostealer-spyware
01/05/2024 00:29:09
QRCode
archive.org
thumbnail

Kandji's threat research team has discovered a piece of malware that combines aspects of an infostealer and spyware. Here's how it works.

kandji EN 2024 spyware infostealer cuckoo analysis
Global attacker median dwell time continues to fall https://www.helpnetsecurity.com/2024/04/24/2023-attacker-dwell-time/
29/04/2024 20:36:55
QRCode
archive.org
thumbnail

The global attacker median dwell time continued trending downwards in 2023, and is now 10 days (from 16 days in the previous year).

helpnetsecurity EN 2024 M-Trends median dwell-time detection Mandiant
From IcedID to Dagon Locker Ransomware in 29 Days https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
29/04/2024 06:41:41
QRCode
archive.org
  • In late August 2023, we observed an intrusion that started with a phishing campaign using PrometheusTDS to distribute IcedID.
  • IcedID dropped and executed a Cobalt Strike beacon, which was then used through-out the intrusion.
  • The threat actor leveraged a bespoke PowerShell tool known as AWScollector to facilitate a range of malicious activities including discovery, lateral movement, data exfiltration, and ransomware deployment.
  • Group Policy was used to distribute Cobalt Strike beacons at login to a specific privileged user group.
  • The threat actor utilized a suite of tools to support their activities, deploying Rclone, Netscan, Nbtscan, AnyDesk, Seatbelt, Sharefinder, and AdFind.
  • This case had a TTR (time to ransomware) of 29 days.
thedfirreport EN 2024 PrometheusTDS TTR IcedID report
The walls of Apple’s garden are tumbling down https://www.theverge.com/24141929/apple-iphone-imessage-antitrust-dma-lock-in
27/04/2024 19:45:38
QRCode
archive.org
thumbnail

Since the very first iPhone, the walls of Apple’s meticulously manicured garden have grown ever higher. Now, they’re starting to crumble.

theverge EN 2024 Apple garden antitrust policy
WP Automatic WordPress plugin hit by millions of SQL injection attacks https://www.bleepingcomputer.com/news/security/wp-automatic-wordpress-plugin-hit-by-millions-of-sql-injection-attacks/
27/04/2024 19:23:36
QRCode
archive.org
thumbnail

Hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts with administrative privileges and to plant backdoors for long-term access.

bleepingcomputer EN 2024 Actively-Exploited Plugin SQL-Injection Vulnerability WordPress WP-Automatic
page 106 / 223
5036 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn