Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 126 / 207
4135 résultats taggé EN  ✕
New macOS 'KandyKorn' malware targets cryptocurrency engineers https://www.bleepingcomputer.com/news/security/new-macos-kandykorn-malware-targets-cryptocurrency-engineers/
05/11/2023 11:22:34
QRCode
archive.org

A new macOS malware dubbed 'KandyKorn' has been spotted in a campaign attributed to the North Korean Lazarus hacking group, targeting blockchain engineers of a cryptocurrency exchange platform.

The attackers impersonate members of the cryptocurrency community on Discord channels to spread Python-based modules that trigger a multi-stage KandyKorn infection chain.

Elastic Security discovered and attributed the attacks to Lazarus based on overlaps with past campaigns concerning the employed techniques, network infrastructure, code-signing certificates, and custom Lazarus detection rules.

bleepingcomputer EN 2023 macOS Lazarus Discord Python-based cryptocurrency engineers Targeted
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604 https://www.rapid7.com/blog/post/2023/11/01/etr-suspected-exploitation-of-apache-activemq-cve-2023-46604/
04/11/2023 16:23:08
QRCode
archive.org
thumbnail

On October 27, Rapid7 Managed Detection & Response identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in 2 separate customer environments.

rapid7 EN 2023 CVE-2023-46604 Apache ActiveMQ
Four dozen countries declare they won't pay ransomware ransoms | CyberScoop https://cyberscoop.com/ransomware-ransom-pledge-pay/
04/11/2023 16:09:24
QRCode
archive.org
thumbnail

The coalition aims to encourage members to no longer pay ransoms demanded by criminal hacking groups to discourage attacks from taking place.

cyberscoop EN 2023 coalition ransomware pay
Apple 'Find My' network can be abused to steal keylogged passwords https://www.bleepingcomputer.com/news/apple/apple-find-my-network-can-be-abused-to-steal-keylogged-passwords/
04/11/2023 15:34:01
QRCode
archive.org
thumbnail

Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards.

The Find My network and application is designed to help users locate lost or misplaced Apple devices, including iPhones, iPads, Macs, Apple Watches, AirPods, and Apple Tags.

The service relies on GPS and Bluetooth data crowd-sourced from millions of Apple devices worldwide to find devices reported as lost or stolen, even if those are offline.

bleepingcomputer EN 2023 Apple Apple-Find-My Bluetooth Data-Exfiltration Find-My Keylogger Network
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security https://positive.security/blog/send-my
04/11/2023 15:32:24
QRCode
archive.org
thumbnail

Apple AirTags: Arbitrary data can be uploaded from non-internet-connected devices by sending Find My BLE broadcasts to nearby Apple devices. We're releasing an ESP32 firmware that turns the microcontroller into an (upload only) modem, and a macOS application to retrieve, decode and display the uploaded data.

positive.security EN 2023 Apple AirTags Arbitrary data
New Microsoft Exchange zero-days allow RCE, data theft attacks https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/?s=09
04/11/2023 09:39:26
QRCode
archive.org
thumbnail

Microsoft Exchange is impacted by four zero-day vulnerabilities that attackers can exploit remotely to execute arbitrary code or disclose sensitive information on affected installations.

bleepingcomputer EN 2023 Microsoft Exchange RCE zero-day ZDI
ZDI-23-1578 | Zero Day Initiative https://www.zerodayinitiative.com/advisories/ZDI-23-1578/?s=09
04/11/2023 09:38:18
QRCode
archive.org

(0Day) Microsoft Exchange ChainedSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability

zerodayinitiative EN 2023 0-Day Microsoft Exchange ChainedSerializationBinder Deserialization RCE
Cyber experts and officials raise alarms about exploits against Citrix and Apache productsoited vulnerability (KEV) list. https://therecord.media/cyber-officials-raise-alarms-citrix-apache?s=09
03/11/2023 19:16:29
QRCode
archive.org

Several new vulnerabilities with critical severity scores are causing alarm among experts and cyber officials.

Zero-day bugs affecting products from Citrix and Apache have recently been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) known exploited vulnerability (KEV) list.

Incident responders at the cybersecurity company Rapid7 warned of hackers connected to the HelloKitty ransomware exploiting a vulnerability affecting Apache ActiveMQ, classified as CVE-2023-46604. Apache ActiveMQ is a Java-language open source message broker that facilitates communication between servers.

therecord EN 2023 CVE-2023-46604 Apache ActiveMQ Citrix
Microsoft is overhauling its software security after major Azure cloud attacks https://www.theverge.com/2023/11/2/23943178/microsoft-security-secure-future-initiative-cybersecurity
03/11/2023 09:11:11
QRCode
archive.org
thumbnail

Microsoft is making big changes to its cybersecurity approach. It comes after major cloud attacks in recent years and will mean an overhaul to how software is built inside Microsoft.

theverge EN 2023 Microsoft approach announce Secure Future Initiative SFI
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html
02/11/2023 22:13:58
QRCode
archive.org
thumbnail

In recent years, cybercriminals have become increasingly professional — fraudsters have consistently been improving their skills, making less crucial mistakes, and creating various “as-a-service” businesses to help lower-skilled threat actors launch scams and attacks, allowing the latter to run full cybercrime operations.

There are different types of cybercrime services that exist today, including malware-as-a-service, where cybercriminals develop and sell malware services to other malicious actors; the service also includes creating and spreading malware types such as ransomware on compromised hosts. Meanwhile, other services require the use of multiple social media accounts to be successfully carried out, such as misinformation, spamming, and malware propagation. Indeed, it’s not uncommon for cybercriminals to send thousands of spam messages using thousands of accounts on social media platforms. But how do they manage to automate all of it?

ltrendmicro EN 2023 social-media Kopeechka Social Media Accounts Creation Service Cybercrime
Mozi botnet goes dark under mysterious circumstances https://www.scmagazine.com/news/mozi-botnet-goes-dark-in-mysterious-circumstances
02/11/2023 21:27:37
QRCode
archive.org
thumbnail

Researchers speculate that Chinese authorities may be responsible for turning off one of the internet’s most prolific IoT botnets.

scmagazine EN 2023 Mozi botnet
How a tiny Pacific Island became the global capital of cybercrime https://www.technologyreview.com/2023/11/02/1082798/tiny-pacific-island-global-capital-cybercrime/
02/11/2023 18:49:09
QRCode
archive.org
thumbnail

Despite having a population of just 1,400, until recently, Tokelau’s .tk domain had more users than any other country. Here’s why.

technologyreview EN 2023 domain TLD Tokelau
FIRST Announces CVSS 4.0 - New Vulnerability Scoring System https://thehackernews.com/2023/11/first-announces-cvss-40-new.html
02/11/2023 18:22:13
QRCode
archive.org
thumbnail

FIRST announces CVSS v4.0, the latest version of the Common Vulnerability Scoring System. Discover how this update addresses critical vulnerabilities.

thehackernews EN 2023 CVSS CVSS4.0 Vulnerability Scoring System
Microsoft profiles new threat group with unusual but effective practices https://arstechnica.com/security/2023/10/microsoft-profiles-new-threat-group-with-unusual-but-effective-practices/
02/11/2023 11:26:09
QRCode
archive.org
thumbnail

Octo Tempest employs tactics that many of its targets aren't prepared for.

arstechnica Microsoft EN 2023 OctoTempest practices Tactics TTP
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/
02/11/2023 11:23:35
QRCode
archive.org
thumbnail

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for many organizations across multiple industries.

microsoft EN 2023 analysis OctoTempest campaigns tactics
Boeing says 'cyber incident' hit parts business after ransom threat | Reuters https://www.reuters.com/business/aerospace-defense/boeing-investigating-cyber-incident-affecting-parts-business-2023-11-01/
02/11/2023 11:16:28
QRCode
archive.org
thumbnail

Boeing , one of the world's largest defense and space contractors, said on Wednesday it was investigating a cyber incident that impacted elements of its parts and distribution business and cooperating with a law enforcement probe into it.

reuters EN 2023 Boing ransomware
CVE-2023-46604 https://attackerkb.com/topics/IHsgZDE3tS/cve-2023-46604/rapid7-analysis
01/11/2023 18:53:18
QRCode
archive.org
thumbnail

Apache ActiveMQ is a message broker service, designed to act as a communication bridge between disparate services. Developed in Java, it can broker multiple pr…

attackerkb EN 2023 analysis CVE-2023-46604 Apache ActiveMQ
Massive ransomware attack hinders services in 70 German municipalities https://therecord.media/massive-cyberattack-hinders-services-in-germany
01/11/2023 16:59:15
QRCode
archive.org
thumbnail

Hackers encrypted the servers of the municipal service provider Südwestfalen IT, leading the company to restrict access to its infrastructure for over 70 municipalities in western Germany.

therecord EN 2023 ransomware Germany municipalities
2022 RTF Global Ransomware Incident Map: Attacks continue worldwide, groups splinter, education sector hit hard https://securityandtechnology.org/blog/2022-global-ransomware-incident-map/
01/11/2023 13:15:39
QRCode
archive.org
thumbnail

According to ecrime.ch data, confirmed ransomware incidents occurred in 105 countries, originating from 58 ransomware groups.  This number is relatively consistent with last year’s data, in which we calculated that incidents impacted organizations in 109 countries and documented at least 60 distinct ransomware families.  Though the overall statistics remain relatively consistent from last year to this year, there is more to the story: new trends in the ecosystem include the shifting dynamics of ransomware groups, the rise of the education sector as a key target, and the trends in geographic distribution of attacks.

securityandtechnology EN 2023 2022 Global Ransomware Incident Map ecrime
Massive cybercrime URL shortening service uncovered via DNS data https://www.bleepingcomputer.com/news/security/massive-cybercrime-url-shortening-service-uncovered-via-dns-data/
01/11/2023 07:25:49
QRCode
archive.org
thumbnail

A threat actor that security researchers call Prolific Puma has been providing link shortening services to cybercriminals for at least four years while keeping a sufficiently low profile to operate undetected.

bleepingcomputer EN 2023 Shortener URL NameSilo Prolific Computer usTLD DNS Security InfoSec Puma TLD
page 126 / 207
4719 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio