Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 108 / 206
4117 résultats taggé EN  ✕
Thanksgiving 2023 security incident https://blog.cloudflare.com/thanksgiving-2023-security-incident?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
07/02/2024 07:49:28
QRCode
archive.org
thumbnail

On Thanksgiving Day, November 23, 2023, Cloudflare detected a threat actor on our self-hosted Atlassian server. Our security team immediately began an investigation, cut off the threat actor’s access, and no Cloudflare customer data or systems were impacted by this event.

cloudflare EN 2024 CrowdStrike Atlassian Confluence Jira Okta incident
Chinese hackers infect Dutch armed forces network with malware https://www.bleepingcomputer.com/news/security/chinese-hackers-infect-dutch-armed-forces-network-with-malware/
06/02/2024 19:50:53
QRCode
archive.org
thumbnail

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the Military Intelligence and Security Service (MIVD) of the Netherlands.

bleepingcomputer EN 2024 Army China COATHANGER Cyber-espionage Defense Fortigate Fortinet Malware Netherlands
Fingerprint photo led investigators to therapy centre hacking suspect https://yle.fi/a/74-20058572
06/02/2024 18:41:12
QRCode
archive.org
thumbnail

Police said their first big break in the case was provided by the suspect's carelessness.

yle.fi EN 2024 Fingerprint suspect photo Vastaamo
Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability https://www.zerodayinitiative.com/blog/2024/2/5/cve-2023-46263-ivanti-avalanche-arbitrary-file-upload-vulnerability
06/02/2024 18:40:29
QRCode
archive.org
thumbnail

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Lucas Miller and Dusan Stevanovic of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in the Ivanti Avalanche enterprise mobility management program. Other Ivanti products

zerodayinitiative EN 2024 CVE-2023-46263 Ivanti Avalanche analysis
Government hackers targeted iPhones owners with zero-days, Google says https://techcrunch.com/2024/02/06/government-hackers-targeted-iphones-owners-with-zero-days-google-says/
06/02/2024 15:57:41
QRCode
archive.org
thumbnail

One of the hacking campaigns used exploits developed by Variston, a Barcelona-based startup. Sources say the spyware maker is losing staff.

techcrunch EN 2024 security apple cybersecurity google hackers infosec ios iphone spyware surveillance variston zero-days
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/
06/02/2024 10:27:54
QRCode
archive.org
thumbnail

Analysis of ransomware gang leak site data reveals significant activity over 2023. As groups formed — or dissolved — and tactics changed, we synthesize our findings.

unit42 2024 EN Retrospective Analysis ransomware Data-Leak-Site
45,000 Jenkins servers remain vulnerable to RCE attacks https://www.theregister.com/2024/01/30/jenkins_rce_flaw_patch/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
05/02/2024 13:26:45
QRCode
archive.org
thumbnail

Multiple publicly available exploits have since been published for the critical flaw

theregister EN 2024 Jenkins CVE-2024-23897 RCE
Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’ https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html
04/02/2024 18:20:48
QRCode
archive.org
thumbnail

A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call, according to Hong Kong police.

cnn 2024 EN deepfake CFO-scam scam HongKong
Leaky Vessels flaws allow hackers to escape Docker, runc containers https://www.bleepingcomputer.com/news/security/leaky-vessels-flaws-allow-hackers-to-escape-docker-runc-containers/
04/02/2024 16:43:29
QRCode
archive.org
thumbnail

Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the underlying host operating system.

The flaws were discovered by Snyk security researcher Rory McNamara in November 2023, who reported them to impacted parties for fixing.

Snyk has found no signs of active exploitation of the Leaky Vessels flaws in the wild, but the publicity could change the exploitation status, so all impacted system admins are recommended to apply the available security updates as soon as possible.

bleepingcomputer EN 2024 Cloud Container Container-Escape Docker Leaky-Vessels Vulnerability CVE-2024-21626 CVE-2024-23651 CVE-2024-23652 CVE-2024-23653
Zyxel VPN Series Pre-auth Remote Command Execution https://ssd-disclosure.com/ssd-advisory-zyxel-vpn-series-pre-auth-remote-command-execution/
04/02/2024 14:03:43
QRCode
archive.org
thumbnail

Summary Chaining of three vulnerabilities allows unauthenticated attackers to execute arbitrary command with root privileges on Zyxel VPN firewall (VPN50, VPN100, VPN300, VPN500, VPN1000). Due to recent attack surface changes in Zyxel, the chain described below broke and become unusable – we have decided to disclose this even though it is no longer exploitable. Credit … SSD Advisory – Zyxel VPN Series Pre-auth Remote Command Execution Read More »

ssd-disclosure EN 2024 Advisory Zyxel VPN Series Pre-auth RCE
“Scammers Paradise” Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations https://labs.guard.io/scammers-paradise-exploring-telegrams-dark-markets-breeding-ground-for-modern-phishing-a2225e51898e
04/02/2024 13:45:50
QRCode
archive.org

Explore the shift in phishing from Dark web to Telegram, where cybercriminals trade tools and data, and uncover Guardio's insights on countering this menace.

labs.guard.io EN 2024 Scammers Telegram cybercriminals Dark-Market
AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web https://securityaffairs.com/158595/cyber-crime/anydesk-credentials-leaked-dark-web.html
04/02/2024 11:59:37
QRCode
archive.org
thumbnail

Resecurity identified bad actors offering a significant number of AnyDesk customer credentials for sale on the Dark Web.

securityaffairs EN 2024 AnyDesk incident darkweb credentials
Investigation: Apparent Russian disinformation group posing as ex-president Poroshenko targets foreign fighters in Ukraine https://kyivindependent.com/investigation-apparent-russian-disinformation-group-posing-as-ex-president-poroshenko-targets-foreign-fighters-in-ukraine/
04/02/2024 10:45:41
QRCode
archive.org
thumbnail
  • An apparent Russian state-aligned group is targeting Ukraine’s International Legion in a disinformation campaign
  • The Kyiv Independent obtained and analyzed exclusive video that shows the group used doctored footage to pose as the Ukrainian ex-president on a Zoom call that took place in early January
  • Legion members are being tricked into agreeing with incendiary statements against Zelensky
  • Lack of cultural context, morale issues and low pay in some units have made the International Legion more susceptible to such attacks
  • The attack appears linked to the Russian government-aligned provocateurs Vladimir Kuznetsov and Alexey Stolyarov, known as Vovan and Lexus
  • The effort highlights ongoing disinformation threats in the Ukraine-Russia war as well as possible information security vulnerabilities of Ukraine’s foreign fighters
kyivindependent EN 2024 Russia-Ukraine-war deepfake TA499 Zoom
AnyDesk says hackers breached its production servers, resets passwords https://www.bleepingcomputer.com/news/security/anydesk-says-hackers-breached-its-production-servers-resets-passwords/
02/02/2024 23:31:39
QRCode
archive.org
thumbnail

AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. BleepingComputer has learned that source code and private code signing keys were stolen during the attack.

bleepingcomputer En 2024 AnyDesk Code-Signing-Certificate Cyberattack Source-Code
There Are Too Many Damn Honeypots https://vulncheck.com/blog/too-many-honeypots
02/02/2024 22:33:51
QRCode
archive.org
thumbnail

VulnCheck faces a horde of honeypots while assessing the potential impact of Atlassian Confluence's CVE-2023-22527. This blog delves into Shodan queries to filter out honeypots and uncover the actual on-premise Confluence install base.

vulncheck EN 2024 honeypots shodan Case-study filter
Here is Apple's official 'jailbroken' iPhone for security researchers | TechCrunch https://techcrunch.com/2024/02/01/here-is-apples-official-jailbroken-iphone-for-security-researchers/
01/02/2024 19:22:28
QRCode
archive.org
thumbnail

A security researchers shared a picture of the instructions that go along Apple's Security Research Device and more details about this special iPhone.

techcrunch EN 2024 apple bugs cybersecurity iphone vulnerabilities Jailbreak
How Memory Forensics Revealed Exploitation of Ivanti Connect Secure VPN Zero-Day Vulnerabilities https://www.volexity.com/blog/2024/02/01/how-memory-forensics-revealed-exploitation-of-ivanti-connect-secure-vpn-zero-day-vulnerabilities/
01/02/2024 18:46:42
QRCode
archive.org
thumbnail

Volexity regularly prioritizes memory forensics when responding to incidents. This strategy improves investigative capabilities in many ways across Windows, Linux, and macOS. This blog post highlights some specific ways memory forensics played a key role in determining how two zero-day vulnerabilities were being chained together to achieve unauthenticated remote code execution in Ivanti Connect Secure VPN devices.

volexity EN 2024 Ivanti Connect Secure VPN Zero-Day Vulnerabilities
Apple fixes zero-day bug in Apple Vision Pro that 'may have been exploited' https://techcrunch.com/2024/01/31/apple-vision-pro-zero-day-security-bug-exploited/
01/02/2024 11:51:56
QRCode
archive.org
thumbnail

Apple said the vulnerability, which is being exploited in the wild, allows malicious code to run on an affected device.

techcrunch EN 2024 security apple-vision-pro cybersecurity exploit vulnerability
DarkGate malware delivered via Microsoft Teams - detection and response https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-delivered-via-microsoft-teams-detection-and-response
01/02/2024 09:05:20
QRCode
archive.org
thumbnail

While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector. Most Teams activity is intra-organizational, but Microsoft enables External Access by default, which allows members of one organization to add users outside the organization to their Teams chats. Perhaps predictably, this feature has provided malicious actors a new avenue by which to exploit untrained or unaware users.

cybersecurity.att.com EN 2024 Microsoft Teams phishing malware
The "EventLogCrasher" 0day For Remotely Disabling Windows Event Log, And a Free Micropatch For It https://blog.0patch.com/2024/01/the-eventlogcrasher-0day-for-remotely.html
31/01/2024 17:51:48
QRCode
archive.org
thumbnail

If you ever troubleshooted anything on Windows or investigated a suspicious event, you know that Windows store various types of events in Windows Event Log. An application crashed and you want to know more about it? Launch the Event Viewer and check the Application log. A service behaving strangely? See the System log. A user account got unexpectedly blocked? The Security log may reveal who or what blocked it.

All these events are getting stored to various logs through the Windows Event Log service. Unsurprisingly, this service's description says: "Stopping this service may compromise security and reliability of the system."

The Windows Event Log service performs many tasks. Not only is it responsible for writing events coming from various source to persistent file-based logs (residing in %SystemRoot%\System32\Winevt\Logs), it also provides structured access to these stored events through applications like Event Viewer. Furthermore, this service also performs "event forwarding" if you want your events sent to a central log repository like Splunk or Sumo Logic, an intrusion detection system or a SIEM server.

Therefore, Windows Event Log service plays an important role in many organizations' intrusion detection and forensic capabilities. And by extension, their compliance check boxes.

0patch EN 2024 EventLogCrasher Windows Event Log
page 108 / 206
4699 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio