Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 117 / 253
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network https://m-en.yna.co.kr/view/AEN20240511001900320?ref=news.risky.biz
15/05/2024 11:29:45
QRCode
archive.org
thumbnail

A North Korean hacking group had stolen a massive amount of personal information from a South Korean court computer network, probe results showed on Saturday.

A total of 1,014 gigabytes worth of data and documents were leaked from Seoul's court computer network between January 2021 and February 2023 by the hacking group, presumed to be Lazarus, according to the joint probe by the police, the prosecution and the National Intelligence Service.

m-en.yna.co.kr North-Korea stolen Seoul Lazarus Court South-Korea
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers https://www.bleepingcomputer.com/news/security/poc-exploit-released-for-rce-zero-day-in-d-link-exo-ax4800-routers/
15/05/2024 00:24:02
QRCode
archive.org
thumbnail

The D-Link EXO AX4800 (DIR-X4860) router is vulnerable to remote unauthenticated command execution that could lead to complete device takeovers by attackers with access to the HNAP port.

bleepingcomputer EN 2024 Authentication-Bypass D-Link Exploit Proof-of-Concept Remote-Command-Execution Router Vulnerability Zero-Day Security InfoSec Computer-Security
VMware fixes three zero-day bugs exploited at Pwn2Own 2024 https://www.bleepingcomputer.com/news/security/vmware-fixes-three-zero-day-bugs-exploited-at-pwn2own-2024/
14/05/2024 19:58:47
QRCode
archive.org
thumbnail

VMware fixed four security vulnerabilities in the Workstation and Fusion desktop hypervisors, including three zero-days exploited during the Pwn2Own Vancouver 2024 hacking contest.
#Computer #Hypervisor #InfoSec #Pwn2Own #Security #VMware #Zero-Day

Zero-Day Pwn2Own Computer VMware InfoSec Hypervisor Security
Leveraging DNS Tunneling for Tracking and Scanning https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/
14/05/2024 18:52:34
QRCode
archive.org
thumbnail

This article presents a case study on new applications of domain name system (DNS) tunneling we have found in the wild. These techniques expand beyond DNS tunneling only for command and control (C2) and virtual private network (VPN) purposes.

Malicious actors occasionally employ DNS tunneling as a covert communications channel, because it can bypass conventional network firewalls. This allows C2 traffic and data exfiltration that can remain hidden from some traditional detection methods.

unit42 EN 2024 DNS Tunneling Tracking Scanning research analysis
2023 Kaspersky Incident Response report https://securelist.com/kaspersky-incident-response-report-2023/112504/
14/05/2024 14:28:22
QRCode
archive.org
thumbnail

The report shares statistics and observations from incident response practice in 2023, analyzes trends and gives cybersecurity recommendations.
#Cybersecurity #Incident #Internal #LockBit #Ransomware #Security #Statistics #Threats #response #services

securelist 2024 2023 EN Threats Cybersecurity Security Incident LockBit response Internal services Statistics Ransomware
Malicious Go Binary Delivered via Steganography in PyPI https://blog.phylum.io/malicious-go-binary-delivered-via-steganography-in-pypi/
14/05/2024 10:34:12
QRCode
archive.org
thumbnail

On May 10, 2024, Phylum’s automated risk detection platform alerted us to a suspicious publication on PyPI. The package was called requests-darwin-lite and appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into

phylum EN 2024 Steganography macOS Go
Ongoing Malvertising Campaign leads to Ransomware https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/
14/05/2024 10:18:38
QRCode
archive.org
thumbnail

Rapid7 has observed an ongoing campaign to distribute trojanized installers for WinSCP and PuTTY via malicious ads on commonly used search engines, where clicking on the ad leads to typo squatted domains.

rapid7 EN 2024 Malvertising Campaign Ransomware WinSCP PuTTY
Distribution of DanaBot Malware via Word Files Detected by AhnLab EDR https://asec.ahnlab.com/en/65399/
14/05/2024 10:18:00
QRCode
archive.org
thumbnail

There are two types of malicious documents that are distributed via email recently: those exploiting equation editor and those including external link URLs. This post will describe the infection flow of the DanaBot malware that is distributed through documents containing external links, the latter method, as well as the evidence and detection process with the AhnLab EDR product’s diagram. Figure 1 shows the content of a spam email with a Word document attached that contains an external link. As you can see, it is a sophisticatedly disguised email pretending to be a job application form to deceive the recipient. The attached file (.docx) is a Word document that contains an external link.

ahnlab EN 2024 DanaBot email Word
My life as a Chinese spy: Secret police agent tells all - ABC News https://www.abc.net.au/news/2024-05-13/china-spy-secret-police-agent-tells-all-four-corners/103826708
13/05/2024 13:31:39
QRCode
archive.org
thumbnail

A Chinese spy who is now on Australian soil has revealed his incredible story to Four Corners.

abc EN 2024 spy secret-police china agent spying
Stolen children’s health records posted online in extortion bid https://therecord.media/scotland-nhs-children-records-posted-extortion-ransomware
13/05/2024 08:35:21
QRCode
archive.org
thumbnail

Cybercriminals have published another batch of data stolen from NHS Dumfries and Galloway in Scotland, this time including information about children.

therecord.media EN 2024 Scotland NHS health extortion ransomware childrens
Europol confirms web portal breach, says no operational data stolen https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/?ref=news.risky.biz
13/05/2024 06:44:20
QRCode
archive.org
thumbnail

Europol, the European Union's law enforcement agency, confirmed that its Europol Platform for Experts (EPE) portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only (FOUO) documents containing classified data.
#Breach #Computer #Data #EPE #Europol #InfoSec #Leak #Security #Theft

bleepingcomputer EN 2024 Europol Security EPE Theft Leak InfoSec Data Breach Computer
Over 50,000 Tinyproxy servers vulnerable to critical RCE flaw https://www.bleepingcomputer.com/news/security/over-50-000-tinyproxy-servers-vulnerable-to-critical-rce-flaw/
12/05/2024 13:10:58
QRCode
archive.org
thumbnail

Nearly 52,000 internet-exposed Tinyproxy instances are vulnerable to CVE-2023-49606, a recently disclosed critical remote code execution (RCE) flaw.

bleepingcomputer EN 2024 CVE-2023-49606 Tinyproxy
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery https://thehackernews.com/2024/05/mirai-botnet-exploits-ivanti-connect.html?m=1
12/05/2024 13:10:11
QRCode
archive.org

Ivanti Connect Secure (ICS) devices are under attack! Two critical vulnerabilities are being exploited to deploy the notorious Mirai botnet.

thehackernews EN 2024 Mirai Botnet Ivanti Connect Payload
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign https://thehackernews.com/2024/05/kremlin-backed-apt28-targets-polish.html?m=1
12/05/2024 13:08:34
QRCode
archive.org

Russia-Linked APT28 Strikes Poland with Malware Campaign Polish government bodies were hit by a sophisticated malware attack orchestrated by the infam

thehackernews EN 2024 APT28 Poland Malware
The UK Says a Huge Payroll Data Breach by a ‘Malign Actor’ Has Exposed Details of Military Personnel https://www.securityweek.com/the-uk-says-a-huge-payroll-data-breach-by-a-malign-actor-has-exposed-details-of-military-personnel/
12/05/2024 13:06:58
QRCode
archive.org

The UK Ministry of Defense said a breach at a third-party payroll system exposed as many as 272,000 armed forces personnel and veterans.

securityweek EN 2024 UK Defense Payroll military data-breach veterans
Chi sono gli operatori telefonici sfruttati dall’azienda italiana di sorveglianza Carro https://irpimedia.irpi.eu/setelefonando-operatori-telefonici-sorveglianza-geolocalizzazione-carro/
12/05/2024 08:48:22
QRCode
archive.org
thumbnail

Con il sistema Carro Gwp è possibile ottenere in tempo reale informazioni sulla posizione di un cellulare partendo dal solo numero di telefono. La tecnologia è venduta a governi e agenzie di intelligence

irpimedia IT 2024 sorveglianza Carro spia CarroGwp cellulare
Dell API abused to steal 49 million customer records in data breach https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/
11/05/2024 10:36:42
QRCode
archive.org
thumbnail

The threat actor behind the recent Dell data breach revealed they scraped information of 49 million customer records using an partner portal API they accessed as a fake company.
#API #Breach #Computer #Data #Dell #Forum #Hacking #InfoSec #Limit #Rate #Scraping #Security

Security Data Forum Scraping Limit Rate Computer Breach Dell InfoSec Hacking API
Un logiciel russe utilisé par Fedpol et Armasuisse suscite des inquiétudes sécuritaires https://www.rts.ch/info/suisse/2024/article/un-logiciel-russe-utilise-par-fedpol-et-armasuisse-suscite-des-inquietudes-securitaires-28495192.html
09/05/2024 15:33:23
QRCode
archive.org
thumbnail

Un système russe de décryptage des iPhone et PC est utilisé par Fedpol et Armasuisse. Certains experts n'excluent pas les risques de cybersécurité que font encourir l'usage par ces deux institutions fédérales du logiciel russe.

RTS FR CH Suisse 2024 logiciel Russie Elcomsoft Armasuisse fedpol
Safari Flaw Can Expose iPhone Users in the EU to Tracking https://www.mysk.blog/2024/04/28/safari-tracking/
09/05/2024 13:38:14
QRCode
archive.org

Apple's implementation of installing marketplace apps from Safari is heavily flawed and can allow a malicious marketplace to track users across websites

mysk EN 2024 ios macos safari Flaw iPhone EU Tracking
Big Vulnerabilities in Next-Gen BIG-IP https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
09/05/2024 12:48:05
QRCode
archive.org
thumbnail

Our ongoing research has identified remotely exploitable vulnerabilities in F5’s Next Central Manager that can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next Central Manager. These attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing malicious persistence within the environment. At the time of writing, we have not seen any indication that these vulnerabilities have been exploited in the wild.

eclypsium EN 2024 BIG-IP vulnerabilities CVE-2024-21793 CVE-2024-26026
page 117 / 253
5048 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn