Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 112 / 206
4119 résultats taggé EN  ✕
Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe https://thehackernews.com/2024/01/turkish-hackers-exploiting-poorly.html?m=1
15/01/2024 07:18:40
QRCode
archive.org
thumbnail

Turkish hackers targeting poorly secured MS SQL servers across the U.S., European Union, and Latin America.

thehackernews EN 2024 Turkey MSSQL exploitation
ShinyHunters member gets 3 years in prison for breaching 60 firms https://www.bleepingcomputer.com/news/security/shinyhunters-member-gets-3-years-in-prison-for-breaching-60-firms/
15/01/2024 07:17:59
QRCode
archive.org
thumbnail

The U.S. District Court in Seattle sentenced ShinyHunters member Sebastien Raoult to three years in prison and ordered a restitution of $5,000,000.
#Broker #Computer #Customer #Data #Hackers #InfoSec #Legal #Prison #Security #ShinyHunters #Theft

bleepingcomputer EN 2024 Data InfoSec Legal ShinyHunters
Turkish hackers targeting database servers with Mimic ransomware https://therecord.media/turkish-hackers-targeting-databases-mimic
15/01/2024 07:11:11
QRCode
archive.org
thumbnail

The “RE#TURGENCE” campaign is targeting victims in the E.U., U.S. and Latin America by going after Microsoft SQL, researchers with Securonix found.

therecord.media EN 2024 Turkey RE#TURGENCE capaign
Anthropic researchers find that AI models can be trained to deceive https://techcrunch.com/2024/01/13/anthropic-researchers-find-that-ai-models-can-be-trained-to-deceive/
15/01/2024 06:44:13
QRCode
archive.org
thumbnail

A study co-authored by researchers at Anthropic finds that AI models can be trained to deceive -- and that this deceptive behavior is difficult to combat.

techcrunch EN 2024 AI models study deceive research Anthropic
CVE-2024-21591 - Juniper J-Web OOB Write vulnerability https://censys.com/cve-2024-21591-juniper-j-web-oob-write-vulnerability/
14/01/2024 12:26:19
QRCode
archive.org
thumbnail
  • Juniper Networks recently patched a critical pre-authentication Remote Code Execution (RCE) vulnerability in the J-Web configuration interface across all versions of Junos OS on SRX firewalls and EX switches.
  • Unauthenticated actors could exploit this vulnerability to gain root access or initiate Denial of Service (DoS) attacks on devices that have not been patched. Ensure your systems are updated promptly to mitigate this risk.
  • Check for exposed J-Web configuration interfaces using this Censys Search query: services.software.uniform_resource_identifier: cpe:2.3:a:juniper:jweb:*:*:*:*:*:*:*:*.
  • As emphasized last year in CISA’s BOD 23-02 guidance, exposed network management interfaces continue to pose a significant risk. Restrict access to these interfaces from the public internet wherever possible.
censys EN 2024 CVE-2024-21591 Juniper J-Web OOB vulnerability RCE exposed
Hackers can infect network-connected wrenches to install ransomware https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/
13/01/2024 16:57:55
QRCode
archive.org
thumbnail

Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.

arstechnica EN 2024 wrenches ransomware IoT
Cryptojacker arrested in Ukraine over EUR 1.8 million mining scheme https://www.europol.europa.eu/media-press/newsroom/news/cryptojacker-arrested-in-ukraine-over-eur-1.8-million-mining-scheme
13/01/2024 14:18:40
QRCode
archive.org
thumbnail

The 29-year-old individual was apprehended in Mykolaiv, Ukraine, on 9 January. Three properties were searched to gather evidence against the main suspect. The arrest comes after months of intensive collaboration between Ukrainian authorities, Europol and a cloud provider, who worked tirelessly to identify and locate the individual behind the widespread cryptojacking operation.The suspect is believed to have mined over USD...

europol EN 2024 apprehended Ukraine Cryptojacker arrested
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
12/01/2024 15:25:42
QRCode
archive.org
thumbnail

This blog delves into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware's payload.

trendmicro EN 2023 CVE-2023-36025 Phemedrone Stealer
Attack of the week: Airdrop tracing – A Few Thoughts on Cryptographic Engineering https://blog.cryptographyengineering.com/2024/01/11/attack-of-the-week-airdrop-tracing/
12/01/2024 11:33:32
QRCode
archive.org
thumbnail

It's been a while since I wrote an "attack of the week" post, and the fault for this is entirely mine. I've been much too busy writing boring posts about Schnorr signatures! But this week's news brings an exciting story with both technical and political dimensions: new reports claim that Chinese security agencies have developed…

cryptographyengineering EN 2023 Airdrop Cryptographic analysis tracing
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability https://www.redpacketsecurity.com/act-now-cisa-flags-active-exploitation-of-microsoft-sharepoint-vulnerability/
12/01/2024 10:22:53
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server to its

redpacketsecurity EN 2024 CISA Microsoft SharePoint CVE-2023-29357
SharePoint Pre-Auth RCE chain (CVE-2023–29357 & CVE-2023–24955) | STAR Labs https://starlabs.sg/blog/2023/09-sharepoint-pre-auth-rce-chain/
12/01/2024 10:21:59
QRCode
archive.org
thumbnail

Brief I may have achieved successful exploitation of a SharePoint target during Pwn2Own Vancouver 2023. While the live demonstration lasted only approximately 30 seconds, it is noteworthy that the process of discovering and crafting the exploit chain consumed nearly a year of meticulous effort and research to complete the full exploit chain.
This exploit chain leverages two vulnerabilities to achieve pre-auth remote code execution (RCE) on the SharePoint server:
Authentication Bypass – An unauthenticated attacker can impersonate as any SharePoint user by spoofing valid JSON Web Tokens (JWTs), using the none signing algorithm to subvert signature validation checks when verifying JWT tokens used for OAuth authentication.

starlabs.sg EN 2023 CVE-2023–29357 SharePoint CVE-2023–24955
Linux devices are under attack by a never-before-seen worm | Ars Technica https://arstechnica.com/security/2024/01/a-previously-unknown-worm-has-been-stealthily-targeting-linux-devices-for-a-year/
11/01/2024 12:48:32
QRCode
archive.org
thumbnail

Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.

arstechnica 2024 EN Mirai variant self-replicating NoaBot cryptomining never-before-seen
AirDrop 'Cracked' By Chinese Authorities to Identify Senders https://www.macrumors.com/2024/01/09/airdrop-cracked-chinese-authorities/
11/01/2024 09:28:36
QRCode
archive.org
thumbnail

Apple's AirDrop feature has reportedly been cracked by a Chinese state-backed institution, allowing authorities to identify senders who share...

macrumors EN 2024 China AirDrop Identify
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
11/01/2024 08:45:03
QRCode
archive.org
thumbnail

Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN appliances. An official security advisory and knowledge base article have been released by Ivanti that includes mitigation that should be applied immediately. However, a mitigation does not remedy a past or ongoing compromise. Systems should simultaneously be thoroughly analyzed per details in this post to look for signs of a breach.

volexity EN 2023 CVE-2024-21887 Ivanti CVE-2023-46805 PulseSecure VPN 0-day
NSA official: hackers use AI bots like ChatGPT to perfect English https://www.nbcnews.com/tech/security/nsa-hacker-ai-bot-chat-chatgpt-bard-english-google-openai-rcna133086
10/01/2024 08:57:00
QRCode
archive.org
thumbnail

NSA Cybersecurity Director Rob Joyce said the spy agency has seen hackers use chatbots like ChatGPT to perfect their English for phishing schemes.

nbcnews EN 2024 NSA RobJoyce ChatGPT phishing AI
SEC Has Not Approved Bitcoin ETFs, but Its Hacked X Account Briefly Said Otherwise https://www.coindesk.com/policy/2024/01/09/sec-twitter-compromised-chair-gensler-says-after-account-said-bitcoin-etfs-approved/
10/01/2024 08:30:47
QRCode
archive.org
thumbnail

The X account of the U.S. Securities and Exchange Commission, which is deciding whether to approve bitcoin ETFs, "was compromised," the regulator told CoinDesk.

coindesk EN 2024 SEC x Twitter account compromised hacked bitcoin
Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police https://decoded.avast.io/threatresearch/avast-updates-babuk-ransomware-decryptor-in-cooperation-with-cisco-talos-and-dutch-police/
09/01/2024 13:36:22
QRCode
archive.org
thumbnail

Avast is releasing an updated version of the Avast Babuk decryption tool, capable of restoring files encrypted by the Babuk variant called Tortilla.

avast EN 2024 Babuk decryption tool Tortilla
Netgear, Hyundai latest X accounts hacked to push crypto drainers https://www.bleepingcomputer.com/news/security/netgear-hyundai-latest-x-accounts-hacked-to-push-crypto-drainers/
09/01/2024 13:34:14
QRCode
archive.org
thumbnail

The official Netgear and Hyundai MEA Twitter/X accounts (together with over 160,000 followers) are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware.

bleepingcomputer EN 2024 X CryptoCurrency Drainer Hyundai Netgear Scam Twitter Wallet-Drainer
Meet Ika & Sal: The Bulletproof Hosting Duo from Hell https://krebsonsecurity.com/2024/01/meet-ika-sal-the-bulletproof-hosting-duo-from-hell/
09/01/2024 09:32:30
QRCode
archive.org

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. All four pleaded guilty to conspiracy and racketeering charges. But…

krebsonsecurity EN 2024 Bulletproof Spamdot hosting Ika Sal crime
Ransomware gang takes credit for Christmas attack on global Lutheran organization https://therecord.media/world-council-churches-lutheran-world-federation-cyberattacks
09/01/2024 09:17:05
QRCode
archive.org
thumbnail

The World Council of Churches reported an incident in December, and the Lutheran World Federation said it experienced a related incident. The Rhysida gang claimed it carried out the attack on the federation.

therecord EN 2023 WCC Lutheran Rhysida ransomware
page 112 / 206
4700 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio