Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 117 / 207
4127 résultats taggé EN  ✕
Vans, Supreme owner VF Corp. says personal data stolen and orders impacted in suspected ransomware attack | TechCrunch https://techcrunch.com/2023/12/18/vans-supreme-vf-corporation-personal-data-stolen-orders-impacted-ransomware/
19/12/2023 14:54:55
QRCode
archive.org
thumbnail

The U.S.-based owner of apparel brands including Vans, Supreme and The North Face says it cannot fulfill customer orders after a cyberattack.

techcrunch EN 2023 cyberattack data-breach ransomware Supreme Vans
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains https://unit42.paloaltonetworks.com/detecting-malicious-stockpiled-domains/
19/12/2023 14:52:21
QRCode
archive.org
thumbnail

Using machine learning to target stockpiled malicious domains, the results of our detection pipeline tool highlight campaigns from phishing to scams.

unit42 EN 2023 TTP technique stockpiled DNS Malicious Early-Detection
The Curious Case of Predatory Sparrow https://sites.google.com/darkcell.se/www/sparrows
19/12/2023 14:39:10
QRCode
archive.org
thumbnail

Reconstructing the Attack from a 4th party collector’s point of view
Hamid Kashfi

[Update: December 18th, 2023]: On 18th December, Predator Sparrows launched a second
attack against the fuel distribution system in Iran, similar to their previous operation in 2021.
Since 2021, Iranian officials or third-party security vendors have not published any analysis or
technical details about the original attack, which is not unusual. Their screenshots from the
latest attacks provide some clues that only confirm our previous work, indicating connections to
the “Yaas Arghavani” company, a VSAT and POS service provider for the fuel distribution
system. The following is an old draft from December 2021, which I wrote for peer eyes rather
than public view. The original draft focused on the first attack against the fuel distribution
system. Still, some remarks remain valid and relevant to the recent attack on 18 Dec 2023, as
little has changed regarding how the system works. The same infrastructure, same suppliers,
and same 3rd party vendors, so we are likely just talking about a different attack vector and
entry point from the previous case. I will probably draft a new note about the recent attack from
scratch soon and when more details are gathered rather than updating the old speculative work.

darkcell.se EN 2023 Predatory-Sparrow Attack Iran Yaas-Arghavani analysis distribution system
FBI: Play ransomware gang has attacked 300 orgs since 2022 https://therecord.media/play-ransomware-targets-hundreds
18/12/2023 22:51:46
QRCode
archive.org
thumbnail

Since it appeared in July 2022, Play ransomware has launched devastating attacks on municipalities and critical infrastructure, agencies said.

therecord EN 2023 Play ransomware FBI report municipalities infrastructure 2022
SMTP Smuggling - Spoofing E-Mails Worldwide https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
18/12/2023 13:20:04
QRCode
archive.org
thumbnail

Introducing a novel technique for e-mail spoofing

sec-consult EN 2023 e-mail spoofing technique
Sophos has patched EOL Firewall versions against a critical flaw exploited in the wild, after identifying a new exploit. https://www.securityweek.com/sophos-patches-eol-firewalls-against-exploited-vulnerability/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
18/12/2023 11:24:18
QRCode
archive.org

UK-based cybersecurity firm Sophos this week announced patches for an exploited vulnerability in Firewall versions that have reached End-of-Life (EOL).

The critical-severity flaw, tracked as CVE-2022-3236, was found to impact versions 19.0 MR1 (19.0.1) and older of the product. It was originally patched in September 2022, but only in supported versions of Sophos Firewall.

Sophos describes the security defect as a code injection issue in the Firewall’s User Portal and Webadmin components, allowing attackers to achieve remote code execution (RCE).

securityweek EN 2023 Sophos CVE-2022-3236 critical-severity EOL Firewall patch
7 December 2023 - Apache Struts version 6.3.0.2 General Availability https://struts.apache.org/announce-2023?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118#a20231207-1
18/12/2023 11:21:46
QRCode
archive.org

7 December 2023 - Apache Struts version 6.3.0.2 General Availability

The Apache Struts group is pleased to announce that Apache Struts version 6.3.0.2 is available as a “General Availability” release. The GA designation is our highest quality grade.

The Apache Struts is an elegant, extensible framework for creating enterprise-ready Java web applications. The framework has been designed to streamline the full development cycle, from building, to deploying, to maintaining applications over time.

This version addresses a potential security vulnerability identified as CVE-2023-50164 and described in S2-066 - please read the mentioned security bulletins for more details. This is a drop-in replacement and upgrade should be straightforward.

apache.org EN 2023 CVE-2023-50164 Apache Struts annonce Vulnerability
Ukrainian cellular and Internet still out, 1 day after suspected Russian cyberattack | Ars Technica https://arstechnica.com/security/2023/12/ukrainian-cells-and-internet-still-out-1-day-after-suspected-russian-cyberattack/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
18/12/2023 11:20:12
QRCode
archive.org
thumbnail

Hackers tied to Russian military take responsibility for hack on Ukraine's biggest provider.

arstechnica EN 2023 Russia-Ukraine-war Russia cellular Ukraine Kyivstar
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
18/12/2023 11:04:16
QRCode
archive.org
thumbnail
  • The Rhadamanthys stealer is a multi-layer malware, sold on the black market, and frequently updated. Recently the author released a new major version, 0.5.0.
  • In the new version, the malware expands its stealing capabilities and also introduces some general-purpose spying functions.
  • A new plugin system makes the malware expandable for specific distributor needs.
  • The custom executable formats, used for modules, are unchanged since our last publication (XS1 and XS2 formats are still in distribution).
  • Check Point Research (CPR) provides a comprehensive review of the agent modules, presenting their capabilities and implementation, with a focus on how the stealer components are loaded and how they work.
checkpoint EN 2023 Rhadamanthys stealer malware analysis
MongoDB says customer data was exposed in a cyberattack https://www.bleepingcomputer.com/news/security/mongodb-says-customer-data-was-exposed-in-a-cyberattack/
17/12/2023 00:12:05
QRCode
archive.org
thumbnail

MongoDB is warning that its corporate systems were breached and that customer data was exposed in a cyberattack that was detected by the company earlier this week.

bleepingcomputer EN 2023 Cyberattack Data-Theft Hack MongoDB Network-Incident data-breach
QNAP VioStor NVR vulnerability actively exploited by malware botnet https://www.bleepingcomputer.com/news/security/qnap-viostor-nvr-vulnerability-actively-exploited-by-malware-botnet/
16/12/2023 17:25:37
QRCode
archive.org
thumbnail

A Mirai-based botnet named 'InfectedSlurs' is exploiting a remote code execution (RCE) vulnerability in QNAP VioStor NVR (Network Video Recorder) devices to hijack and make them part of its DDoS (distributed denial of service) swarm.
#Actively #Botnet #Computer #Exploited #FXC #InfectedSlurs #InfoSec #Malware #QNAP #Router #Security #Vulnerability

bleepingcomputer EN 2023 FXC QNAP InfectedSlurs Actively Botnet Malware Exploited Computer Router Vulnerability
Microsoft’s AI Chatbot Replies to Election Questions With Conspiracies, Fake Scandals, and Lies https://www.wired.com/story/microsoft-ai-copilot-chatbot-election-conspiracy/
16/12/2023 10:13:44
QRCode
archive.org
thumbnail

With less than a year to go before one of the most consequential elections in US history, Microsoft’s AI chatbot is responding to political queries with conspiracies, misinformation, and out-of-date or incorrect information.

When WIRED asked the chatbot, initially called Bing Chat and recently renamed Microsoft Copilot, about polling locations for the 2024 US election, the bot referenced in-person voting by linking to an article about Russian president Vladimir Putin running for reelection next year. When asked about electoral candidates, it listed numerous GOP candidates who have already pulled out of the race.

wired EN 2023 BingChat Chatbot Election Conspiracies Lies AI
Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads https://www.404media.co/cmg-cox-media-actually-listening-to-phones-smartspeakers-for-ads-marketing/
16/12/2023 10:12:20
QRCode
archive.org
thumbnail

A marketing team within media giant Cox Media Group (CMG) claims it has the capability to listen to ambient conversations of consumers through embedded microphones in smartphones, smart TVs, and other devices to gather data and use it to target ads, according to a review of CMG marketing materials by 404 Media and details from a pitch given to an outside marketing professional. Called “Active Listening,” CMG claims the capability can identify potential customers “based on casual conversations in real time.”

404media EN 2023 marketing CMG Cox-Media-Group Listening Phone privacy
Exploiting GOG Galaxy XPC service for privilege escalation in macOS https://securityintelligence.com/x-force/exploiting-gog-galaxy-xpc-service-privilege-escalation-macos/
16/12/2023 01:04:00
QRCode
archive.org
thumbnail

Unpack the analysis of a GOG Galaxy XPC service vulnerability. More from IBM X-Force Red.

securityintelligence 2023 EN macos GOG client XPC vulnerability
Imperva Uncovers CVE-2023-22524, A RCE Vulnerability https://www.imperva.com/blog/cve-2023-22524-rce-vulnerability-in-atlassian-companion-for-macos/
16/12/2023 01:01:43
QRCode
archive.org
thumbnail

Learn about a RCE vulnerability, discovered by the Imperva Red Team, identified as CVE-2023-22524, in Atlassian Companion for macOS.

imperva EN 2023 RCE vulnerability CVE-2023-22524 Atlassian macOS
3CX warns customers to disable SQL database integrations https://www.bleepingcomputer.com/news/security/3cx-warns-customers-to-disable-sql-database-integrations/
15/12/2023 23:37:14
QRCode
archive.org
thumbnail

VoIP communications company 3CX warned customers today to disable SQL Database integrations because of risks posed by what it describes as a potential vulnerability.

bleepingcomputer EN 2023 CRM SQL VoIP Warning 3CX
A pernicious potpourri of Python packages in PyPI https://www.welivesecurity.com/en/eset-research/pernicious-potpourri-python-packages-pypi/
15/12/2023 21:57:30
QRCode
archive.org
thumbnail

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository, ESET research finds.

welivesecurity EN 2023 Python packages malicious PyPI
Paternity and fertility tests among data stolen in Asper Biogene cyberattack | News | ERR https://news.err.ee/1609195705/paternity-and-fertility-tests-among-data-stolen-in-asper-biogene-cyberattack
15/12/2023 21:42:54
QRCode
archive.org
thumbnail

Among the health data illegally downloaded from genetic testing company Asper Biogene's database were details related to paternity and fertility tests. Some of the data is easily understandable and can be directly connected to specific individuals, Pille Lehis, director general of the Data Protection Inspectorate, said on ETV morning show "Terevisioon.".

err.ee EN 2023 cyberattack data-protection-inspectorate pille-lehis asper-biogene health-data-leak
Supply chain attack targeting Ledger crypto wallet leaves users hacked https://techcrunch.com/2023/12/14/supply-chain-attack-targeting-ledger-crypto-wallet-leaves-users-hacked/
15/12/2023 21:39:50
QRCode
archive.org
thumbnail

Hackers pushed out a malicious version of a software library made by crypto company Ledger, which powers several web3 applications.

techcrunch EN 2023 crypto security cryptocurrency ledger Supply-chain-attack
CVE-2023-50164 https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis
15/12/2023 21:27:06
QRCode
archive.org
thumbnail

Apache Struts is a popular Java web application framework. On December 7, 2023 Apache published an advisory for CVE-2023-50164, a Struts parameter pollution vu…

attackerkb EN 2023 CVE-2023-50164 Apache Struts CVE-2023-50164 analysis
page 117 / 207
4710 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio