Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 118 / 236
Here Come the AI Worms https://www.wired.com/story/here-come-the-ai-worms/
01/03/2024 16:26:09
QRCode
archive.org
thumbnail

Security researchers created an AI worm in a test environment that can automatically spread between generative AI agents—potentially stealing data and sending spam emails along the way.

wired EN 2024 artificial-intelligence openai google worm
GitHub besieged by millions of malicious repositories in ongoing attack | Ars Technica https://arstechnica.com/security/2024/02/github-besieged-by-millions-of-malicious-repositories-in-ongoing-attack/
01/03/2024 13:23:06
QRCode
archive.org
thumbnail

GitHub keeps removing malware-laced repositories, but thousands remain.

arstechnica EN 2024 github malicious repositories attack
CISA cautions against using hacked Ivanti VPN gateways even after factory resets https://www.bleepingcomputer.com/news/security/cisa-cautions-against-using-hacked-ivanti-vpn-gateways-even-after-factory-resets/
01/03/2024 09:44:05
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets.

bleepingcomputer EN 2024 CISA FBI Ivanti Warning
Failles d’Ivanti : une centaine d’organisations victimes en France https://www.zdnet.fr/actualites/failles-d-ivanti-une-centaine-d-organisations-victimes-en-france-39964604.htm
01/03/2024 09:42:53
QRCode
archive.org
thumbnail

Dans la plupart des cas, les attaquants n’ont pas tenté d’aller plus loin, sauf quelques exceptions. Il s’agissait vraisemblablement pour les attaquants de mettre d’abord un premier pied chez leur cible.

zdnet EN 2024 Ivanti France victimes attaquants
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Connect and Policy Secure Gateways | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
29/02/2024 19:44:12
QRCode
archive.org

Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.

CISA EN 2024 Ivanti Vulnerabilities Connect persistence Warning
The Predator spyware ecosystem is not dead https://blog.sekoia.io/the-predator-spyware-ecosystem-is-not-dead/
29/02/2024 13:44:02
QRCode
archive.org
thumbnail

Discover our TDR team's revelations about Predator spyware: its C2 infrastructure and list of countries still using its cyber espionage tool.

sekoia En 2024 Predator spyware Angola Madagascar Indonesia Kazakhstan Egypt Botswana Mongolia Sudan
DNS Used to Hide Fake Investment Platform Schemes | Infoblox https://blogs.infoblox.com/cyber-threat-intelligence/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads/
29/02/2024 13:06:52
QRCode
archive.org
thumbnail

Learn how the threat actor Savvy Seahorse Facebook ads to lure users to fake investment platforms and leverages DNS to allow their attacks to persist for years.

infoblox EN 2024 SavvySeahorse CNAME facebook scam crypto-scam DNS
BlackCat Ransomware Affiliate TTPs https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps
29/02/2024 12:11:19
QRCode
archive.org
thumbnail

This blog post provides a detailed look at the TTPs of a ransomware affiliate operator. In this case, the endpoint had been moved to another infrastructure (as illustrated by various command lines, and confirmed by the partner), so while Huntress SOC analysts reported the activity to the partner, no Huntress customer was impacted by the ransomware deployment.

huntress EN 2024 BlackCat Ransomware TTPs ScreenConnect
le team sa - Informations sur le cyberincident chez leteam sa https://www.team.jobs/fr/blog/posts/cyber-incident
29/02/2024 09:26:01
QRCode
archive.org

En décembre 2023, leteam sa a été victime d'une cyber-attaque. Un groupe de ransomware connu a pu accéder au réseau et crypter plusieurs disques. Grâce à une réaction rapide de l'équipe informatique et d'experts en sécurité externes, l'attaque a pu être rapidement contrée et les systèmes restaurés. L'analyse de l'incident a révélé une fuite de certaines données, mais celle-ci a été jugée à l'époque comme étant partiellement critique. Un monitoring a été mis en place pour surveiller une éventuelle publication de données.

team.jobs FR incident ransomware BlackBasta informations
Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
29/02/2024 09:25:00
QRCode
archive.org
thumbnail

The Lazarus Group is back with an upgraded variant of their FudModule rootkit, this time enabled by a zero-day admin-to-kernel vulnerability for CVE-2024-21338. Read this blog for a detailed analysis of this rootkit variant and learn more about several new techniques, including a handle table entry manipulation technique that directly targets Microsoft Defender, CrowdStrike Falcon, and HitmanPro.

avast EN 2024 Lazarus FudModule CVE-2024-21338 vulnerability
Google CEO Sundar Pichai calls AI tool’s responses ‘completely unacceptable’ https://www.semafor.com/article/02/27/2024/google-ceo-sundar-pichai-calls-ai-tools-responses-completely-unacceptable
29/02/2024 06:49:31
QRCode
archive.org
thumbnail

In a memo to employees sent Tuesday evening, Sundar Pichai vowed to make structural changes to address the issues found in Gemini’s racially inaccurate images.

semafor EN 2024 CEO google gemini AI issues inaccurate
How the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin | WIRED https://www.wired.com/story/how-pentagon-learned-targeted-ads-to-find-targets-and-vladimir-putin/
28/02/2024 21:24:01
QRCode
archive.org
thumbnail

Meet the guy who taught US intelligence agencies how to make the most of the ad tech ecosystem, "the largest information-gathering enterprise ever conceived by man."
#Ads #US #department-of-defense #information-gathering #longreads #secrecy-and-surveillance #spies #wired

spies department-of-defense wired US Ads information-gathering longreads secrecy-and-surveillance
Paris 2024 : vol d'un ordinateur et de clés USB contenant des plans de sécurisation des JO https://www.europe1.fr/societe/paris-2024-vol-dun-ordinateur-et-de-cles-usb-contenant-des-plans-de-securisation-des-jo-4233020
28/02/2024 14:04:24
QRCode
archive.org
thumbnail

Lundi soir, dans un train gare du Nord, un ingénieur de la mairie de Paris s'est fait voler une sacoche contenant un ordinateur et deux clés USB. Problème, dessus étaient stockés les plans de sécurisation des Jeux olympiques de Paris 2024 par la police municipale.

europe1 FR 2024 Paris2024 JO vol clés USB sécurisation olympiques
Bundesamt für Verfassungsschutz - Counter-intelligence - Joint Cyber Security Advisory https://www.verfassungsschutz.de/SharedDocs/kurzmeldungen/EN/2024/2024-02-19-joint-cyber-security-advisory.html
28/02/2024 11:51:48
QRCode
archive.org

Warning of North Korean cyber threats targeting the Defense Sector

verfassungsschutz EN 2024 Advisory North North-Korea Counter-intelligence Defense-Sector
Civil society complaint raises concern that LinkedIn is violating DSA ad targeting restrictions https://edri.org/our-work/civil-society-complaint-raises-concern-that-linkedin-is-violating-dsa-ad-targeting-restrictions/?ref=news.risky.biz
28/02/2024 06:50:32
QRCode
archive.org
thumbnail

On 26 February, EDRi and its partners Global Witness, Gesellschaft für Freiheitsrechte and Bits of Freedom have submitted a complaint to the European Commission regarding a potential infringement of the Digital Services Act (DSA).

Specifically, we have raised concerns that LinkedIn, a designated Very Large Online Platform (VLOP) under the DSA, infringes the DSA’s new prohibition of targeting online adverts based on profiling using sensitive categories of personal data such as sexuality, political opinions, or race.

edri.org EN 2024 LinkedIn privacy complaint EU European Digital Rights
Joomla: PHP Bug Introduces Multiple XSS Vulnerabilities https://www.sonarsource.com/blog/joomla-multiple-xss-vulnerabilities/
27/02/2024 18:42:43
QRCode
archive.org
thumbnail
  • Sonar’s Vulnerability Research Team has discovered an issue that led to multiple XSS vulnerabilities in the popular Content Management System Joomla.
  • The issue discovered with the help of SonarCloud affects Joomla’s core filter component and is tracked as CVE-2024-21726.
  • Attackers can leverage the issue to gain remote code execution by tricking an administrator into clicking on a malicious link.
  • The underlying PHP bug is an inconsistency in how PHP’s mbstring functions handle invalid multibyte sequences.
  • The bug was fixed with PHP versions 8.3 and 8.4, but not backported to older PHP versions.
    • Joomla released a security announcement and published version 5.0.3/4.4.3, which mitigates the vulnerability.
sonarsource EN 2024 Joomla PHP Bug CVE-2024-21726
“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emails https://labs.guard.io/subdomailing-thousands-of-hijacked-major-brand-subdomains-found-bombarding-users-with-millions-a5e5fb892935
27/02/2024 18:37:39
QRCode
archive.org

Guardio Labs uncovers a sprawling campaign of subdomain hijacking, compromising already over 8,000 domains from esteemed brands and institutions, including MSN, VMware, McAfee, The Economist, Cornell University, CBS, Marvel, eBay and others. This malicious activity, dubbed “SubdoMailing”, leverages the trust associated with these domains to circulate spam and malicious phishing emails by the Millions each day, cunningly using their credibility and stolen resources to slip past security measures.

In our detailed analysis, we disclose how we detected this extensive subdomain hijacking effort, its mechanisms, its unprecedented scale and the main threat actor behind it. Furthermore, we developedthe “SubdoMailing” checker — a website designed to empower domain owners to reclaim control over their compromised assets and shield themselves against such pervasive threats. This report not only sheds light on the magnitude of the issue but also serves as a call to action for enhancing domain security against future exploits.

labs.guard.io EN 2024 SubdoMailing Hijacked Major-Brand Subdomains Malicious Emails
Chatbots qui «hallucinent» et trompent les clients: quelle responsabilité légale? | ICTjournal https://www.ictjournal.ch/articles/2024-02-27/chatbots-qui-hallucinent-et-trompent-les-clients-quelle-responsabilite-legale
27/02/2024 18:13:40
QRCode
archive.org
thumbnail

Comme l’a illustré un récent verdict contre Air Canada, les entreprises peuvent être jugées responsables des inform

ictjournal FR 2024 chatbots legal hallucinations responsabilité légale IA
PIKABOT, I choose you! https://www.elastic.co/security-labs/pikabot-i-choose-you
27/02/2024 10:51:53
QRCode
archive.org
thumbnail

Elastic Security Labs observed new PIKABOT campaigns, including an updated version. PIKABOT is a widely deployed loader malicious actors utilize to distribute additional payloads.

elastic.co EN 2024 new campaign loader
SEO Poisoning to Domain Control: The Gootloader Saga Continues https://thedfirreport.com/2024/02/26/seo-poisoning-to-domain-control-the-gootloader-saga-continues/
26/02/2024 23:49:00
QRCode
archive.org
thumbnail

Key Takeaways More information about Gootloader can be found in the following reports: The DFIR Report, GootloaderSites, Mandiant, Red Canary, & Kroll. An audio version of this report can be … Read More

thedfirreport EN 2024 Gootloader DFIR
page 118 / 236
4720 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio