Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 11 / 59
1170 résultats taggé 2023  ✕
MAR-10478915-1.v1 Citrix Bleed https://www.cisa.gov/news-events/analysis-reports/ar23-325a
21/11/2023 20:32:29
QRCode
archive.org

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

cisa EN 2023 CitrixBleed analysis IoCs
Rhysida ransomware gang claims attack on British Library • The Register https://www.theregister.com/2023/11/20/rhysida_claims_british_library_ransomware/
21/11/2023 07:19:43
QRCode
archive.org
thumbnail

The Rhysida ransomware group says it's behind the highly disruptive October cyberattack on the British Library, leaking a snippet of stolen data in the process.

A low-res image shared to its leak site appears to show a handful of passport scans, along with other documents, some of which display the format of HMRC employment documents.

theregister EN 2023 Rhysida ransomware British Library, Data-theft
Nearly 9 million patients' records compromised in data breach https://therecord.media/millions-of-patient-records-breached-cyberattack
20/11/2023 20:04:06
QRCode
archive.org
thumbnail

The attack on a medical transcription company is one of the worst healthcare-related data breaches in recent years, according to U.S. Department of Health and Human Services records.

therecord EN 2023 healthcare US databreach medical
Lumma Stealer malware now uses trigonometry to evade detection https://www.bleepingcomputer.com/news/security/lumma-stealer-malware-now-uses-trigonometry-to-evade-detection/
20/11/2023 17:05:02
QRCode
archive.org
thumbnail

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.

bleepingcomputer EN 2023 Anti-VM Info-Stealer Information-stealing-malware Lumma LummaC2 Malware Malware-as-a-Service Security detection
Combien de PME mettent la clé sous la porte après une cyberattaque ? | LeMagIT https://www.lemagit.fr/conseil/Combien-de-PME-mettent-la-cle-sous-la-porte-apres-une-cyberattaque
20/11/2023 15:21:02
QRCode
archive.org
thumbnail

Pour certains, 60 % des PME victimes de cyberattaque déposent le bilan 18 mois après l’attaque. Pour d’autres, ça va plus vite : 6 mois. D’autres encore parlèrent un temps de 70 % sous 3 ans. Enquête sur des chiffres plus que douteux.

lemagit FR PME 2023 impact statistiques cyberattaque étude
Pourquoi les hackers russes sont plus dangereux que jamais https://www.watson.ch/fr/international/guerre%20contre%20l%27ukraine/290897806-pourquoi-les-hackers-russes-sont-plus-dangereux-que-jamais
20/11/2023 10:46:32
QRCode
archive.org
thumbnail

Des experts en sécurité informatique ont enquêté sur un piratage, jusqu'alors inconnu, du groupe «Sandworm» sur le réseau électrique ukrainien.

watson.ch FR 2023 Ukraine Cybercrime Sandworm électricité
Message to current and former public service employees and members of the Canadian Armed Forces and Royal Canadian Mounted Police https://www.canada.ca/en/treasury-board-secretariat/news/2023/11/message-to-current-and-former-public-service-employees-and-members-of-the-canadian-armed-forces-and-royal-canadian-mounted-police.html
20/11/2023 06:42:06
QRCode
archive.org

Message to current and former public service employees and members of the Canadian Armed Forces and Royal Canadian Mounted Police

canada.ca EN 2023 statement government Canada incident databreach
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities https://github.com/yunuscadirci/DIALStranger
20/11/2023 06:41:06
QRCode
archive.org
thumbnail

details about DIAL protocol vulnerabilities . Contribute to yunuscadirci/DIALStranger development by creating an account on GitHub.

yunuscadirci EN 2023 Netflix YouTube Sony Samsung DIAL DIALStranger protocol vulnerability
Thornaby: Woman targeted in £13k train station QR code scam https://www.bbc.com/news/uk-england-tees-67335952
19/11/2023 18:27:58
QRCode
archive.org
thumbnail

Rail firm TransPennine Express has since removed QR codes from all of its station car parks.

bbc EN 2023 UK QRCode scam parking
2023’s ransomware rookies are a remix of Conti and other classics https://www.withsecure.com/en/expertise/blog-posts/2023-ransomware-rookies-are-a-remix-of-conti-and-other-classics
19/11/2023 17:50:13
QRCode
archive.org
thumbnail

Ransomware’s business model is a big part of what’s made it such a potent threat for so many years. However, we dug into multi-point ransomware attacks from 2023, and found another factor in ransomware’s staying power: a seemingly endless supply of new cyber crime groups starting ransomware operations.

withsecure EN 2023 ransomware groups attacks names
NoEscape gang continues to use DDoS to pressure reluctant victims to negotiate https://www.databreaches.net/noescape-gang-continues-to-use-ddos-to-pressure-reluctant-victims-to-negotiate/
19/11/2023 13:51:01
QRCode
archive.org

Over on SuspectFile, Marco A. De Felice reports that the NoEscape ransomware gang is threatening to release 1.5 TB of data from PruittHealth Network. De Felice...

databreaches.net EN 2023 gang NoEscape DDoS
Hackers swipe Booking.com, damage from attack is global https://www.asahi.com/ajw/articles/15055042
18/11/2023 13:14:00
QRCode
archive.org
thumbnail

Hackers breached Booking.com, one of the world’s largest online accommodation reservation sites, by posing as hotel staff to steal credit card information from travelers making bookings.

asahi.com EN 2023 booking.com Japan phishing
Gang says ICBC paid ransom over hack that disrupted US Treasury market | Reuters https://www.reuters.com/technology/cybersecurity/icbc-paid-ransom-after-hack-that-disrupted-markets-cybercriminals-say-2023-11-13/
18/11/2023 12:56:23
QRCode
archive.org
thumbnail

China's biggest lender, the Industrial and Commercial Bank of China, paid a ransom after it was hacked last week, a Lockbit ransomware gang representative said on Monday in a statement which Reuters was unable to independently verify.

reuters EN 2023 China ICBC Ransomware Lockbit paid
Toyota confirms breach after Medusa ransomware threatens to leak data https://www.bleepingcomputer.com/news/security/toyota-confirms-breach-after-medusa-ransomware-threatens-to-leak-data/
18/11/2023 12:54:43
QRCode
archive.org
thumbnail

Toyota Financial Services (TFS) has confirmed that it detected unauthorized access on some of its systems in Europe and Africa after Medusa ransomware claimed an attack on the company.

bleepingcomputer EN 2023 Citrix-Bleed Medusa Ransomware Toyota Toyota-Financial-Services
Negotiating with LockBit: Uncovering the Evolution of Operations and Newly Established Rules https://analyst1.com/blog-negotiating-with-lockbit-uncovering-the-evolution-of-operations-and-newly-established-rules/
17/11/2023 14:55:57
QRCode
archive.org

What defines success for ransomware actors during an attack? Breaching a victim’s network, exfiltrating valuable data, and encrypting systems are crucial components. However, the ultimate measurement of success is the actor’s ability to extort a ransom payment, which determines if they achieve their financial goals. Navigating the ransom negotiation phase, whether conducted by the victims themselves or designated recovery firms, demands a high level of expertise and a deep understanding of the attackers involved. This includes studying of the threat actor’s profile, tactics, and evolving strategies. In this complex landscape, there is no one-size-fits-all playbook for successfully managing the negotiation phase, as each ransomware group exhibits distinct behaviors and adopts new tactics shaped by many factors.

analyst1 EN 2023 LockBit threat-actor TTP ransomware group
Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899 & CVE-2023-36560) https://soroush.me/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/
17/11/2023 11:09:51
QRCode
archive.org

In modern web development, while cookies are the go-to method for transmitting session IDs, the .NET Framework also provides an alternative: encoding the session ID directly in the URL. This method is useful to clients that do not support cookies.

soroush EN 2023 CVE-2023-36899 CVE-2023-36560 Cookieless ASP.NET DuoDrop IIS
Redline Dropped Through MSIX Package https://isc.sans.edu/diary/Redline+Dropped+Through+MSIX+Package/30404/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
17/11/2023 08:39:15
QRCode
archive.org

Redline Dropped Through MSIX Package, Author&colon

isc.sans.edu SANS 2023 EN Redline MSIX Package analysis
Zimbra 0-day used to target international government organizations https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/
16/11/2023 18:01:57
QRCode
archive.org
thumbnail

TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.

blog.google EN 2023 Zimbra 0-day government TAG exploit XSS CVE-2023-37580
European Telecom Body to Open-Source Radio Encryption System https://www.inforisktoday.com/european-telecom-body-to-open-source-radio-encryption-system-a-23599
16/11/2023 16:20:58
QRCode
archive.org
thumbnail

The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols. The European Telecommunications

inforisktoday EN 2023 TETRA ETSI Open-Source Radio Encryption MidnightBlue
Uncovering thousands of unique secrets in PyPI packages https://blog.gitguardian.com/uncovering-thousands-of-unique-secrets-in-pypi-packages/
16/11/2023 15:01:57
QRCode
archive.org
thumbnail

Security Researcher Tom Forbes worked with the GitGuardian team to analyze all the code committed to PyPi packages and surfaced thousands of hardcoded credentials.

gitguardian EN 2023 GitGuardian PyPI research hardcoded credentials secret packages
page 11 / 59
4838 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn