Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 121 / 237
BMW security lapse exposed sensitive company information, researcher finds https://techcrunch.com/2024/02/14/bmw-security-lapse-exposed-sensitive-company-information-researcher-finds/?ref=news.risky.biz
16/02/2024 23:02:19
QRCode
archive.org
thumbnail

A misconfigured cloud storage server belonging to BMW exposed sensitive company information, including private keys and internal data

techcrunch EN 2024 data-leak bmw storage misconfigured
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors https://cyble.com/blog/vulnerable-fortinet-devices-low-hanging-fruit-for-threat-actors/
16/02/2024 09:22:26
QRCode
archive.org
thumbnail

Cyble analyzes the increasing incidences of vulnerabilities in Fortinet, highlighting the impact they have on Critical Infrastructure.

cyble EN 2024 analysis Fortinet exposed
Spyware startup Variston is losing staff — some say it’s closing https://techcrunch.com/2024/02/15/variston-spyware-losing-staff-some-say-closing/?guccounter=1
16/02/2024 07:44:11
QRCode
archive.org
thumbnail

In July 2021, someone sent Google a batch of malicious code that could be used to hack Chrome, Firefox, and PCs running Microsoft Defender. That code was

techcrunch EN 2024 Variston spayware
Ukrainian national pleads guilty for roles in Zeus, IcedID malware operations https://cyberscoop.com/ukrainian-national-pleads-guilty-for-roles-in-zeus-icedid-malware-operations/
16/02/2024 07:43:32
QRCode
archive.org
thumbnail

Vyacheslav Igorevich Penchukov pleaded guilty to two counts, each of which carries a possible 20-year prison term.

cyberscoop EN 2024 Penchukov Zeus IcedID
Gold Rush is back to APAC: Group-IB unveils first iOS trojan stealing your face https://www.group-ib.com/media-center/press-releases/goldfactory-ios-trojan/
15/02/2024 16:14:38
QRCode
archive.org

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has uncovered a new iOS Trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The Trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for developing a suite of highly sophisticated banking Trojans that also includes the earlier discovered GoldDigger and newly identified GoldDiggerPlus, GoldKefu, and GoldPickaxe for Android. To exploit the stolen biometric data, the threat actor utilizes AI face-swapping services to create deepfakes by replacing their faces with those of the victims. This method could be used by cybercriminals to gain unauthorized access to the victim’s banking account – a new fraud technique, previously unseen by Group-IB researchers. The GoldFactory Trojans target the Asia-Pacific region, specifically — Thailand and Vietnam impersonating local banks and government organizations.

Group-IB’s discovery also marks a rare instance of malware targeting Apple’s mobile operating system. The detailed technical description of the Trojans, analysis of their technical capabilities, and the list of relevant indicators of compromise can be found in Group-IB’s latest blog post.

group-ib EN 2024 research faceid stealer iOS trojan GoldPickaxe.iOS
Threat Intel Accelerates Detection & Response https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response
15/02/2024 14:28:01
QRCode
archive.org
thumbnail

Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.

huntress EN 2024 analysis endpoint finger.exe IoC
Disrupting malicious uses of AI by state-affiliated threat actors https://openai.com/blog/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors
15/02/2024 14:16:51
QRCode
archive.org
thumbnail

We terminated accounts associated with state-affiliated threat actors. Our findings show our models offer only limited, incremental capabilities for malicious cybersecurity tasks.

openai EN 2024 malicious AI chatGPT
Patch Tuesday - February 2024 https://www.rapid7.com/blog/post/2024/02/13/patch-tuesday-february-2024/
15/02/2024 14:09:53
QRCode
archive.org
thumbnail

Microsoft is addressing 73 vulnerabilities this February 2024 Patch Tuesday, including two (actually, three!) zero-day/exploited-in-the-wild vulnerabilities, both of which are already included on the CISA KEV list. Today also brings patches for two critical remote code execution (RCE) vulnerabilities, and a critical elevation of privilege vulnerability in Exchange. Six browser vulnerabilities were published separately this month, and are not included in the total.

rapid7 EN 2024 PatchTuesday february-2024 CVE-2024-21351 CVE-2024-21412 CVE-2024-21413
Imposer aux messageries de donner leurs clés pour déchiffrer les messages est illégal, estime la CEDH https://www.lemonde.fr/pixels/article/2024/02/15/imposer-aux-messageries-de-donner-leurs-cles-pour-dechiffrer-les-messages-est-illegal-estime-la-cedh_6216695_4408996.html
15/02/2024 13:59:30
QRCode
archive.org
thumbnail

La Cour européenne des droits de l’homme a donné raison à un utilisateur de l’application Telegram visé par une demande du FSB, le service de sécurité intérieure russe. La décision pourrait avoir un impact sur certaines lois en cours de discussion en Europe.

lemonde FR 2024 EU Cour-Européenne déchiffrer illégal messages Telegram
Denmark orders schools to stop sending student data to Google https://www.bleepingcomputer.com/news/google/denmark-orders-schools-to-stop-sending-student-data-to-google/
15/02/2024 13:55:58
QRCode
archive.org
thumbnail

The Danish data protection authority (Datatilsynet) has issued an injunction regarding student data being funneled to Google through the use of Chromebooks and Google Workspace services in the country's schools.

bleepingcomputer EN 2024 schools Chromebook Data-Protection Denmark Education Google Legal Privacy
Cyberattaque : l’Allemand Varta paralysé https://www.lemagit.fr/actualites/366569997/Cyberattaque-lallemand-Varta-paralyse
15/02/2024 11:24:08
QRCode
archive.org

L’industriel allemand, spécialiste des piles et des batteries, s’est déclaré victime d’une cyberattaque. Plusieurs sites de production sont à l’arrêt.

lemagit FR 2024 Varta cyberattaque
The Risks of the #MonikerLink Bug in Microsoft Outlook and the Big Picture https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/
14/02/2024 22:57:50
QRCode
archive.org
thumbnail

Recently, Check Point Research released a white paper titled “The Obvious, the Normal, and the Advanced: A Comprehensive Analysis of Outlook Attack Vectors”, detailing various attack vectors on Outlook to help the industry understand the security risks the popular Outlook app may bring into organizations. As mentioned in the paper, we discovered an interesting security issue in Outlook when the app handles specific hyperlinks. In this blog post, we will share our research on the issue with the security community and help defend against it. We will also highlight the broader impact of this bug in other software.

checkpoint EN 2024 Outlook CVE-2024-21413 MonikerLink
Zoom fixed critical flaw CVE-2024-24691 in Windows software https://securityaffairs.com/159121/security/zoom-crirical-cve-2024-24691.html
14/02/2024 20:15:28
QRCode
archive.org
thumbnail

Zoom fixed 7 flaws in its desktop and mobile applications, including a critical bug (CVE-2024-24691) affecting the Windows software

securityaffairs CVE-2024-24691 EN 2024 Zoom Windows critical
Clinique privée à Genève victime d'une cyberattaque https://www.20min.ch/fr/story/geneve-clinique-privee-victime-dune-cyberattaque-103042473
14/02/2024 17:38:27
QRCode
archive.org
thumbnail

Cible de hackers, l'établissement de La Colline fonctionne cependant normalement, selon son propriétaire. Celui-ci n'a pas constaté de vols de données des patients.

20min FR CH clinique Genève ransomware
CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day https://www.trendmicro.com/en_us/research/24/b/cve202421412-water-hydra-targets-traders-with-windows-defender-s.html
14/02/2024 11:49:12
QRCode
archive.org
thumbnail

The APT group Water Hydra has been exploiting the Microsoft Defender SmartScreen vulnerability CVE-2024-21412 in its campaigns targeting financial market traders. This vulnerability, which has now been patched by Microsoft, was discovered and disclosed by the Trend Micro Zero Day Initiative.

trendmicro EN 2024 CVE-2024-21412 Water-Hydra exploits-&-vulnerabilities research report apt-&-targeted-attacks
Portal Kombat : un réseau structuré et coordonné de propagande prorusse https://www.sgdsn.gouv.fr/publications/portal-kombat-un-reseau-structure-et-coordonne-de-propagande-prorusse
13/02/2024 21:26:14
QRCode
archive.org
thumbnail

VIGINUM dévoile l’activité d’un réseau baptisé « Portal Kombat », constitué de « portails d’information » numériques diffusant des contenus pro-russes, couvrant positivement l’invasion russe en Ukraine et dénigrant les autorités de Kiev, afin d’influencer les opinions publiques notamment françaises.

VIGINUM FR 2024 Portal-Kombat réseau-structuré propagande prorusse
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor https://www.bleepingcomputer.com/news/security/hackers-exploit-ivanti-ssrf-flaw-to-deploy-new-dslog-backdoor/
13/02/2024 10:13:40
QRCode
archive.org
thumbnail

Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.

bleepingcomputer EN 2024 Backdoor Ivanti Malware SSRF Vulnerability Security InfoSec Computer-Security
Community Alert: Ongoing Malicious Campaign Impacting Azure Cloud Environments https://www.proofpoint.com/us/blog/cloud-security/community-alert-ongoing-malicious-campaign-impacting-azure-cloud-environments
13/02/2024 09:20:32
QRCode
archive.org
thumbnail

Over the past weeks, Proofpoint researchers have been monitoring an ongoing cloud account takeover campaign impacting dozens of Microsoft Azure environments and compromising hundreds of user accoun...

proofpoint EN 2024 Microsoft Azure Campaign compromise cloud-security phishing MFA
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments https://www.justice.gov/opa/pr/international-cybercrime-malware-service-dismantled-federal-authorities-key-malware-sales
13/02/2024 09:18:37
QRCode
archive.org
thumbnail

The Justice Department announced today that, as part of an international law enforcement effort, federal authorities in Boston seized internet domains that were used to sell computer malware used by cybercriminals to secretly access and steal data from victims’ computers. Federal authorities in Atlanta and Boston also unsealed indictments charging individuals in Malta and Nigeria, respectively, for their alleged involvement in selling the malware and supporting cybercriminals seeking to use the malware for malicious purposes.

justice.gov US warzoneRAT FBI Dismantled RAT
page 121 / 237
4721 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio