Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 128 / 207
4135 résultats taggé EN  ✕
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
VMSA-2023-0023 https://www.vmware.com/security/advisories/VMSA-2023-0023.html
25/10/2023 23:47:03
QRCode
archive.org
thumbnail

VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities

vmware EN 2023 vulnerability VMSA-2023-0023 CVE-2023-34048 advisory
iLeakage https://ileakage.com/
25/10/2023 23:45:04
QRCode
archive.org

We present iLeakage, a transient execution side channel targeting the Safari web browser present on Macs, iPads and iPhones. iLeakage shows that the Spectre attack is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery. We show how an attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution. In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content. Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.

ileakage EN 2023 macos Safari Side-Channel ios Spectre speculative
Hackers can force iOS and macOS browsers to divulge passwords and much more https://arstechnica.com/security/2023/10/hackers-can-force-ios-and-macos-browsers-to-divulge-passwords-and-a-whole-lot-more/
25/10/2023 20:34:57
QRCode
archive.org
thumbnail

iLeakage is practical and requires minimal resources. A patch isn't (yet) available.

arstechnica EN 2023 ileakage macos ios speculative
Now Android and Windows devices aren't safe from Flipper Zero either | ZDNET https://www.zdnet.com/article/now-android-and-windows-devices-arent-safe-from-flipper-zero-either/
25/10/2023 15:51:55
QRCode
archive.org
thumbnail

The Bluetooth spam feature that was initially used to inundate, and even crash, iPhones has now been expanded to cover Android and Windows devices.

zdnet EN 203 flipperzero ble spam Android Bluetooth
Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately https://www.bleepingcomputer.com/news/security/citrix-warns-admins-to-patch-netscaler-cve-2023-4966-bug-immediately/
25/10/2023 08:00:52
QRCode
archive.org
thumbnail

Citrix warned admins today to secure all NetScaler ADC and Gateway appliances immediately against ongoing attacks exploiting the CVE-2023-4966 vulnerability.

bleepingcomputer EN 2023 Citrix Netscaler Warning CVE-2023-4966 ADC GAteway
CVE-2023-4966: NetScaler Critical Security Update Now Available https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/
25/10/2023 07:57:47
QRCode
archive.org
thumbnail

CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.

NetScaler EN 2023 CVE-2023-4966 ADC
Battling a new DarkGate malware campaign with Malwarebytes MDR https://www.malwarebytes.com/blog/business/2023/10/on-the-frontlines-battling-an-in-the-wild-darkgate-infection-with-malwarebytes-mdr
24/10/2023 19:33:26
QRCode
archive.org
thumbnail

First publicly reported in 2018, DarkGate is a Windows-based malware with a wide-range of capabilities including credential stealing and remote access to victim endpoints. Until recently, it was only seen being delivered through traditional email malspam campaigns. In late August 2023, however, researchers at Trusec found evidence of a campaign using external Teams messages to deliver the DarkGate Loader.

malwarebytes EN 2023 DarkGate malware
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966 https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
24/10/2023 15:21:10
QRCode
archive.org
thumbnail

It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.

assetnote EN 2023 CVE-2023-4966 session token Citrix
Another plastic surgery practice appears to have been hit — this time by Hunters International https://www.databreaches.net/another-plastic-surgery-practice-appears-to-have-been-hit-this-time-by-hunters-international/
24/10/2023 13:48:00
QRCode
archive.org

On October 17, the FBI issued a Public Service Announcement, Cybercriminals are Targeting Plastic Surgery Offices and Patients. Five days later, DataBreaches learned that there had been another attack on a plastic surgery practice where patient data had allegedly been stolen and is in danger of being leaked publicly. It would not be surprising if the FBI knew about the attack and that it was the impetus for the newly released PSA.

databreaches EN 2023 analysis plastic-surgery data-breaches Hunters-International
Tracking Unauthorized Access to Okta's Support System https://sec.okta.com/harfiles
24/10/2023 10:06:31
QRCode
archive.org

Okta Security has identified adversarial activity that leveraged access to a stolen credential to access Okta's support case management system.

The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases. It should be noted that the Okta support case management system is separate from the production Okta service, which is fully operational and has not been impacted. In addition, the Auth0/CIC case management system is not impacted by this incident.

okta EN 2023 incident
Okta incident and 1Password | 1Password https://blog.1password.com/okta-incident/
24/10/2023 10:05:35
QRCode
archive.org
thumbnail

We detected suspicious activity on our Okta instance that we use to manage our employee-facing apps. We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing.

1password EN 2023 okta incident
1Password Detects Suspicious Activity Following Okta Support Breach https://thehackernews.com/2023/10/1password-detects-suspicious-activity.html
24/10/2023 09:42:51
QRCode
archive.org
thumbnail

1password detected suspicious activity following the Okta support system breach. After investigation, they determined no user data was accessed.

thehackernews EN 2023 1Password Okta investigation
Spain police dismantled a cybercriminal group who stole data of 4 million individuals https://securityaffairs.com/152946/cyber-crime/spanish-police-dismantled-cybercriminal-group.html?amp=1
24/10/2023 07:45:31
QRCode
archive.org
thumbnail

The Spanish police have arrested 34 members of the cybercriminal group that is accused of having stolen data of over 4M individuals.

securityaffairs EN 2023 police arrest cybercriminal group stolen data
Okta stock falls after company says client files accessed by hackers via support system https://www.cnbc.com/2023/10/20/okta-shares-fall-after-company-says-client-files-were-accessed-by-hackers-via-its-support-system.html
21/10/2023 21:19:40
QRCode
archive.org
thumbnail

Cybersecurity firm Okta said an unidentified hacker had accessed the company's support system and viewed client files.

cnbc EN 2023 Okta stock Business hack
How Cloudflare mitigated yet another Okta compromise https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/
21/10/2023 17:10:32
QRCode
archive.org
thumbnail

On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta. We have verified that no Cloudflare customer information or systems were impacted by this event because of our rapid response.

cloudflare EN 2023 Okta Cloudflare
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack
21/10/2023 13:18:42
QRCode
archive.org
thumbnail

Cluster25 analyzed an attack by APT28/FancyBear exploiting the WinRAR vulnerability CVE-2023-38831

cluster25 EN 2023 analysis CVE-2023-38831 Exploited Pro-Russia WinRAR
Measures taken following the unprecedented cyber-attack on the ICC https://www.icc-cpi.int/news/measures-taken-following-unprecedented-cyber-attack-icc
21/10/2023 13:13:37
QRCode
archive.org
thumbnail

Five weeks ago, the International Criminal Court detected a serious cyber security incident, thanks to the alert mechanism provided by its monitoring system. The ICC has made various and serious efforts to address this attack. The Court deems it is its responsibility to continue to inform about these efforts and to provide the relevant additional information on the attack itself.

ICC CPI EN 2023 International-Criminal-Court Cour-Pénale-Internationale lesson-learned forensic mesures cyber-attack
Switzerland’s e-voting system has predictable implementation blunder https://freedom-to-tinker.com/2023/10/06/switzerlands-e-voting-system-has-predictable-implementation-blunder/
21/10/2023 13:11:57
QRCode
archive.org
thumbnail

Last year, I published a 5-part series about Switzerland’s e-voting system.  Like any internet voting system, it has inherent security

freedom-to-tinker EN 2023 e-vote swiss Switzerland predictable implementation blunder
Know the Protocol! - How to Prevent Undetected Vote Manipulation on the Verified Swiss Post E-Voting System https://andreaskuster.ch/blog/2023/CVD-EVoting-Swiss-Post/
21/10/2023 13:05:39
QRCode
archive.org

I’m a Swiss voter living abroad, and like all Swiss expats from Basel-Stadt, St.Gallen or Thurgau, I’ve been invited to vote over the internet in this year’s national election. Switzerland’s e-voting system is supposed to have safeguards to protect the election against malicious actors, however as a computer scientist, I have found a flaw in the practical implementation of one of those safeguards.

andreaskuster EN 2023 swiss vote expats e-voting system Manipulation
page 128 / 207
4719 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio