Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 113 / 213
4253 résultats taggé E*N  ✕
Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your face https://www.group-ib.com/media-center/press-releases/goldfactory-ios-trojan/
15/02/2024 16:14:38
QRCode
archive.org

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has uncovered a new iOS Trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The Trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing a suite of highly sophisticated banking Trojans that also includes the earlier discovered GoldDigger and newly identified GoldDiggerPlus, GoldKefu, and GoldPickaxe for Android. To exploit the stolen biometric data, the threat actor utilizes AI face-swapping services to create deepfakes by replacing their faces with those of the victims. This method could be used by cybercriminals to gain unauthorized access to the victim’s banking account – a new fraud technique, previously unseen by Group-IB researchers. The GoldFactory Trojans target the Asia-Pacific region, specifically — Thailand and Vietnam impersonating local banks and government organizations.

Group-IB’s discovery also marks a rare instance of malware targeting Apple’s mobile operating system. The detailed technical description of the Trojans, analysis of their technical capabilities, and the list of relevant indicators of compromise can be found in Group-IB’s latest blog post.

group-ib EN 2024 research faceid stealer iOS trojan GoldPickaxe.iOS
Threat Intel Accelerates Detection & Response https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response
15/02/2024 14:28:01
QRCode
archive.org
thumbnail

Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.

huntress EN 2024 analysis endpoint finger.exe IoC
Disrupting malicious uses of AI by state-affiliated threat actors https://openai.com/blog/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors
15/02/2024 14:16:51
QRCode
archive.org
thumbnail

We terminated accounts associated with state-affiliated threat actors. Our findings show our models offer only limited, incremental capabilities for malicious cybersecurity tasks.

openai EN 2024 malicious AI chatGPT
Patch Tuesday - February 2024 https://www.rapid7.com/blog/post/2024/02/13/patch-tuesday-february-2024/
15/02/2024 14:09:53
QRCode
archive.org
thumbnail

Microsoft is addressing 73 vulnerabilities this February 2024 Patch Tuesday, including two (actually, three!) zero-day/exploited-in-the-wild vulnerabilities, both of which are already included on the CISA KEV list. Today also brings patches for two critical remote code execution (RCE) vulnerabilities, and a critical elevation of privilege vulnerability in Exchange. Six browser vulnerabilities were published separately this month, and are not included in the total.

rapid7 EN 2024 PatchTuesday february-2024 CVE-2024-21351 CVE-2024-21412 CVE-2024-21413
Denmark orders schools to stop sending student data to Google https://www.bleepingcomputer.com/news/google/denmark-orders-schools-to-stop-sending-student-data-to-google/
15/02/2024 13:55:58
QRCode
archive.org
thumbnail

The Danish data protection authority (Datatilsynet) has issued an injunction regarding student data being funneled to Google through the use of Chromebooks and Google Workspace services in the country's schools.

bleepingcomputer EN 2024 schools Chromebook Data-Protection Denmark Education Google Legal Privacy
The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/
14/02/2024 22:57:50
QRCode
archive.org
thumbnail

Recently, Check Point Research released a white paper titled “The Obvious, the Normal, and the Advanced: A Comprehensive Analysis of Outlook Attack Vectors”, detailing various attack vectors on Outlook to help the industry understand the security risks the popular Outlook app may bring into organizations. As mentioned in the paper, we discovered an interesting security issue in Outlook when the app handles specific hyperlinks. In this blog post, we will share our research on the issue with the security community and help defend against it. We will also highlight the broader impact of this bug in other software.

checkpoint EN 2024 Outlook CVE-2024-21413 MonikerLink
Zoom fixed critical flaw CVE-2024-24691 in Windows software https://securityaffairs.com/159121/security/zoom-crirical-cve-2024-24691.html
14/02/2024 20:15:28
QRCode
archive.org
thumbnail

Zoom fixed 7 flaws in its desktop and mobile applications, including a critical bug (CVE-2024-24691) affecting the Windows software

securityaffairs CVE-2024-24691 EN 2024 Zoom Windows critical
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day https://www.trendmicro.com/en_us/research/24/b/cve202421412-water-hydra-targets-traders-with-windows-defender-s.html
14/02/2024 11:49:12
QRCode
archive.org
thumbnail

The APT group Water Hydra has been exploiting the Microsoft Defender SmartScreen vulnerability CVE-2024-21412 in its campaigns targeting financial market traders. This vulnerability, which has now been patched by Microsoft, was discovered and disclosed by the Trend Micro Zero Day Initiative.

trendmicro EN 2024 CVE-2024-21412 Water-Hydra exploits-&-vulnerabilities research report apt-&-targeted-attacks
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor https://www.bleepingcomputer.com/news/security/hackers-exploit-ivanti-ssrf-flaw-to-deploy-new-dslog-backdoor/
13/02/2024 10:13:40
QRCode
archive.org
thumbnail

Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.

bleepingcomputer EN 2024 Backdoor Ivanti Malware SSRF Vulnerability Security InfoSec Computer-Security
Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments https://www.proofpoint.com/us/blog/cloud-security/community-alert-ongoing-malicious-campaign-impacting-azure-cloud-environments
13/02/2024 09:20:32
QRCode
archive.org
thumbnail

Over the past weeks, Proofpoint researchers have been monitoring an ongoing cloud account takeover campaign impacting dozens of Microsoft Azure environments and compromising hundreds of user accoun...

proofpoint EN 2024 Microsoft Azure Campaign compromise cloud-security phishing MFA
New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/
13/02/2024 09:12:38
QRCode
archive.org
thumbnail

Bitdefender researchers have discovered a new backdoor targeting Mac OS users.

bitdefender EN 2024 macOS Backdoor rust Trojan.MAC.RustDoor analysis
EU capitals fear Russian retaliation and cyberattacks after asset freezes https://www.politico.eu/article/russia-cyberattack-retaliation-asset-freezes-eu-war-ukraine/
12/02/2024 01:24:55
QRCode
archive.org
thumbnail

G7 is drafting a workaround to use frozen assets to rebuild Ukraine.

politico EN 2024 Banks retaliation Belgium Budget Canada Courts Cybercrime Cybersecurity EU-Budget/MFF Eurozone Finance-and-banking Financial-stability France Germany Hackers Johan-Van-Overtveldt Kremlin Risk-and-compliance Russia Sanctions State-backed-hacking Ukraine United-Kingdom Russia-Ukraine-war
Fake LastPass App Sneaks Past Apple's Review Team https://www.macrumors.com/2024/02/08/fake-lastpass-app-in-apple-app-store/
12/02/2024 01:21:17
QRCode
archive.org
thumbnail

Popular password management app LastPass is warning customers about a fraudulent app that uses a similar name and icon to attempt to trick LastPass...

macrumors EN 2024 App-Store LastPass fake fraudulent
KV-Botnet: Don’t call it a Comeback - Lumen https://blog.lumen.com/kv-botnet-dont-call-it-a-comeback/
12/02/2024 01:14:17
QRCode
archive.org
thumbnail

Executive Summary On December 13, 2023, Lumen’s Black Lotus Labs reported our findings on the KV-botnet, a covert data transfer network used by state-sponsored actors based in China to conduct espionage and intelligence activities targeting U.S. critical infrastructure. Around the time of the first publication, we identified a spike in activity that we assess aligns

lumen EN 2024 KV-Botnet China espionnage report
New RustDoor macOS malware impersonates Visual Studio update https://www.bleepingcomputer.com/news/security/new-rustdoor-macos-malware-impersonates-visual-studio-update/
09/02/2024 17:20:46
QRCode
archive.org
thumbnail

A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.

bleepingcomputer EN 2024 ALPHV Backdoor BlackCat Data-Exfiltration macOS Malware Ransomware
World Govs, Tech Giants Sign Spyware Responsibility Pledge https://www.darkreading.com/endpoint-security/world-govs-sign-spyware-responsibility-pledge
08/02/2024 21:31:29
QRCode
archive.org
thumbnail

France, the UK, the US, and others will work on a framework for the responsible use of tools like NSO Group's Pegasus, and Shadowserver Foundation gains £1 million investment.

darkreading EN 2024 shadowserver Spyware Pledge
Hyundai Motor Europe hit by Black Basta ransomware attack https://www.bleepingcomputer.com/news/security/hyundai-motor-europe-hit-by-black-basta-ransomware-attack/
08/02/2024 21:29:06
QRCode
archive.org
thumbnail

Car maker Hyundai Motor Europe suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three terabytes of corporate data.

bleepingcomputer EN 2024 Black-Basta Data-Theft Hyundai Hyundai-Motor-Europe Ransomware
Ivanti: Patch new Connect Secure auth bypass bug immediately https://www.bleepingcomputer.com/news/security/ivanti-patch-new-connect-secure-auth-bypass-bug-immediately/
08/02/2024 21:25:42
QRCode
archive.org
thumbnail

Today, Ivanti warned of a new authentication bypass vulnerability impacting Connect Secure, Policy Secure, and ZTA gateways, urging admins to secure their appliances immediately.

bleepingcomputer EN 2024 CVE-2024-22024 Authentication-Bypass Connect-Secure Ivanti Policy-Secure Warning Security InfoSec Computer-Security
CVE-2024-22024 (XXE) for Ivanti Connect Secure and Ivanti Policy Secure https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US
08/02/2024 21:24:51
QRCode
archive.org

As part of our ongoing investigation into the vulnerabilities impacting Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways, we have discovered a new vulnerability. This vulnerability only affects a limited number of supported versions – Ivanti Connect Secure (version 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2 and 22.5R1.1), Ivanti Policy Secure version 22.5R1.1 and ZTA version 22.6R1.3.
A patch is available now for Ivanti Connect Secure (versions 9.1R14.5, 9.1R17.3, 9.1R18.4, 22.4R2.3, 22.5R1.2, 22.5R2.3 and 22.6R2.2), Ivanti Policy Secure (versions 9.1R17.3, 9.1R18.4 and 22.5R1.2) and ZTA gateways (versions 22.5R1.6, 22.6R1.5 and 22.6R1.7).

ivanti EN advisory CVE-2024-22024
Security Update for Ivanti Connect Secure and Ivanti Policy Secure Gateways https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways-282024
08/02/2024 21:23:02
QRCode
archive.org

At Ivanti, our top priority is upholding our commitment to deliver and maintain secure products for our customers. Our team has been working around the clock to aggressively review all code and is singularly focused on bringing full resolution to the issues affecting Ivanti Connect Secure (formerly Pulse Connect Secure), Ivanti Policy Secure and ZTA gateways.

We have been following our product incident response process and rigorously assessing our products and code alongside world-class security experts and collaborating with the broader security ecosystem to share intelligence. We are committed to communicating findings openly with customers, consistent with our commitment to security and responsible disclosure.

ivanti EN 2024 CVE-2024-22024 Security Update
page 113 / 213
4838 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn