Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 129 / 207
4136 résultats taggé EN  ✕
Know the Protocol! - How to Prevent Undetected Vote Manipulation on the Verified Swiss Post E-Voting System https://andreaskuster.ch/blog/2023/CVD-EVoting-Swiss-Post/
21/10/2023 13:05:39
QRCode
archive.org

I’m a Swiss voter living abroad, and like all Swiss expats from Basel-Stadt, St.Gallen or Thurgau, I’ve been invited to vote over the internet in this year’s national election. Switzerland’s e-voting system is supposed to have safeguards to protect the election against malicious actors, however as a computer scientist, I have found a flaw in the practical implementation of one of those safeguards.

andreaskuster EN 2023 swiss vote expats e-voting system Manipulation
Several websites of Belgian institutions disrupted yesterday by DDoS attack https://ccb.belgium.be/en/news/several-websites-belgian-institutions-disrupted-yesterday-ddos-attack
21/10/2023 13:00:09
QRCode
archive.org

Several websites of Belgian institutions (such as those of the Royal Palace, the Chancellery of the Prime Minister and the Senate) experienced some disruption late Thursday afternoon.

belgium EN 2023 ccb Belgian institutions disrupted DDoS NoName
Cisco discloses new IOS XE zero-day exploited to deploy malware implant https://www.bleepingcomputer.com/news/security/cisco-discloses-new-ios-xe-zero-day-exploited-to-deploy-malware-implant/
21/10/2023 12:50:53
QRCode
archive.org
thumbnail

Cisco disclosed a new high-severity zero-day (CVE-2023-20273) today, actively exploited to deploy malicious implants on IOS XE devices compromised using the CVE-2023-20198 zero-day unveiled earlier this week.

bleepingcomputer EN 2023 Cisco IOS-XE Zero-Day CVE-2023-20273
D-Link confirms data breach after employee phishing attack https://www.bleepingcomputer.com/news/security/d-link-confirms-data-breach-after-employee-phishing-attack/
21/10/2023 12:40:05
QRCode
archive.org
thumbnail

Taiwanese networking equipment manufacturer D-Link confirmed a data breach linked to information stolen from its network and put up for sale on BreachForums earlier this month.

bleepingcomputer EN 2023 D-Link Data-Breach Phishing BreachForums
Ragnar Locker ransomware gang taken down by international police swoop https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-police-swoop
21/10/2023 12:26:33
QRCode
archive.org
thumbnail

This action, coordinated at international level by Europol and Eurojust, targeted the Ragnar Locker ransomware group. The group were responsible for numerous high-profile attacks against critical infrastructure across the world. In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain and Latvia. The “key target” of this malicious ransomware strain was arrested in Paris,...

europol EN 2023 Ragnar Locker ransomware Takedown
Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover https://www.darkreading.com/vulnerabilities-threats/critical-solarwinds-rce-bugs-enable-unauthorized-network-takeover
21/10/2023 12:16:46
QRCode
archive.org

SolarWinds' access controls contain five high and three critical-severity security vulnerabilities that need to be patched yesterday.

darkreading EN 2023 RCE SolarWinds CVE-2023-35181 CVE-2023-35183
Casio keyed up after data loss hits customers in 149 countries • The Register https://www.theregister.com/AMP/2023/10/19/casio_data_theft/
19/10/2023 23:22:00
QRCode
archive.org
thumbnail

Crooks broke into the ClassPad server and swiped online learning database

Japanese electronics giant Casio said miscreants broke into its ClassPad server and stole a database with personal information belonging to customers in 149 countries.

ClassPad is Casio's education web app, and in a Wednesday statement on its website, the firm said an intruder breached a ClassPad server and swiped hundreds of thousands of "items" belonging to individuals and organizations around the globe.

theregister EN 2023 data-loss databreach Casio ClassPad database
Ukrainian activists hack Trigona ransomware gang, wipe servers https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/
19/10/2023 20:10:09
QRCode
archive.org
thumbnail

A group of cyber activists under the Ukrainian Cyber Alliance banner has hacked the servers of the Trigona ransomware gang and wiped them clean after copying all the information available.

bleepingcomputer EN 2023 Ukrainian-Cyber-Alliance Trigona ransomware gang hacked
Ragnar Locker ransomware’s dark web extortion sites seized by police https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomwares-dark-web-extortion-sites-seized-by-police/
19/10/2023 19:13:53
QRCode
archive.org
thumbnail

The Ragnar Locker ransomware operation's Tor negotiation and data leak sites were seized Thursday morning as part of an international law enforcement operation.

bleepingcomputer EN 2023 Ragnar Ransomware Leak Seizure police
CIA exposed to intelligence interception due to X's URL bug https://www.theregister.com/2023/10/18/cia_x_url_bug/
19/10/2023 12:20:35
QRCode
archive.org
thumbnail

Musk's mega-app-in-waiting goes from chopping headlines to profile URLs
An ethical hacker has exploited a bug in the way X truncates URLs to take over a CIA Telegram channel used to receive intelligence.

Kevin McSheehan, who uses the online handle "Pad," spotted the issue after hovering over the link to the CIA's Telegram channel displayed on its X social media profile.

theregister EN 2023 X McSheehan Pad Telegram CIA URL bug Twitter
Synology NAS DSM Account Takeover: When Random is not Secure https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure
18/10/2023 09:20:23
QRCode
archive.org
  • Team82 has uncovered the use of a weak random number generator in Synology’s DiskStation Manager (DSM) Linux-based operating system running on the company’s network-attached storage (NAS) products

  • The insecure Math.random() method was used to generate the password of the admin password for the NAS device itself.

  • Under some rare conditions, an attacker could leak enough information to restore the seed of the pseudorandom number generator (PRNG), reconstruct the admin password, and remotely take over the admin account.

  • The vulnerability, tracked as CVE-2023-2729, has been addressed by Synology. Synology’s advisory is here.

claroty team42 EN 2023 CVE-2023-2729 ynology NAS DSM Account Takeover random DSM
The forgotten malvertising campaign https://www.malwarebytes.com/blog/threat-intelligence/2023/10/the-forgotten-malvertising-campaign
17/10/2023 23:05:39
QRCode
archive.org
thumbnail

In recent weeks, we have noted an increase in malvertising campaigns via Google searches. Several of the threat actors we are tracking have improved their techniques to evade detection throughout the delivery chain.

We believe this evolution will have a real world impact among corporate users getting compromised via malicious ads eventually leading to the deployment of malware and ransomware.

In this blog post, we look at a malvertising campaign that seems to have flown under the radar entirely for at least several months. It is unique in its way to fingerprint users and distribute time sensitive payloads.

malwarebytes EN 2023 Notepad++ GoogleAds malvertising
Hackers exploit critical flaw in WordPress Royal Elementor plugin https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-wordpress-royal-elementor-plugin/
17/10/2023 21:47:36
QRCode
archive.org
thumbnail

A critical severity vulnerability impacting Royal Elementor Addons and Templates up to version 1.3.78 is reported to be actively exploited by two WordPress security teams.

bleepingcomputer EN 2023 WordPress Zero-Day Elementor 0-Day CVE-2023-5360
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/
17/10/2023 19:57:30
QRCode
archive.org
thumbnail

Cisco has identified active exploitation of a previously unknown vulnerability in the Web User Interface (Web UI) feature of Cisco IOS XE software (CVE-2023-20198) when exposed to the internet or untrusted networks.

talosintelligence EN 2023 Cisco IOS XE Web Management CVE-2023-20198
Breast Imaging During a Cyberattack and Global Pandemic: What We Did to Pick Up the Pieces - ScienceDirect https://www.sciencedirect.com/science/article/abs/pii/S0887217122000750
16/10/2023 10:43:32
QRCode
archive.org

Cybersecurity in healthcare is a very real threat with the potential to severely disrupt patient care, place extra burden on an already strained system, and result in significant financial losses for a hospital or healthcare network. In October 2020, on the backdrop of the ongoing COVID-19 pandemic, our institution experienced one of the most significant cyberattacks on a healthcare system to date, lasting for nearly 40 days. By sharing our experience in radiology, and specifically in breast imaging, including the downtime procedures we relied upon and the lessons that we learned emerging from this cyberattack, we hope to help future victims of a healthcare cyberattack successfully weather such an experience.

sciencedirect EN 2023 healthcare ransomware impact experience Vermont UVMMC
Samba - Security Announcement Archive https://www.samba.org/samba/security/CVE-2023-3961.html
16/10/2023 10:15:52
QRCode
archive.org

The SMB 1/2/3 protocols allow clients to connect to named
pipes via the IPC$ (Inter-Process Communication) share
for the process of inter-process communication between
SMB clients and servers.

samba EN 2023 CVE-2023-3961
Disclosing the BLOODALCHEMY backdoor https://www.elastic.co/security-labs/disclosing-the-bloodalchemy-backdoor
15/10/2023 19:37:10
QRCode
archive.org
thumbnail

BLOODALCHEMY is a new, actively developed, backdoor that leverages a benign binary as an injection vehicle, and is a part of the REF5961 intrusion set.

elastic.co EN 2023 BLOODALCHEMY backdoor REF5961 analysis
Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641) https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/
13/10/2023 09:53:33
QRCode
archive.org
thumbnail

CVE-2023-43641 is a vulnerability in libcue, which can lead to code execution by downloading a file on GNOME.

github EN 2023 CVE-2023-43641 libcue GNOME
LinkedIn Smart Links Fuel Credential Phishing Campaign https://cofense.com/blog/linkedin-smart-links-credential-phishing-campaign/
13/10/2023 09:21:57
QRCode
archive.org
thumbnail

Learn what LinkedIn Smart Links are and how they're being used to bypass email security gateways. Get up-to-date information on this credential phishing threat

cofense EN 2023 LinkedIn Smart Links Phishing Campaign
Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack https://checkmarx.com/blog/users-of-telegram-aws-and-alibaba-cloud-targeted-in-latest-supply-chain-attack/
13/10/2023 09:20:30
QRCode
archive.org
thumbnail

During the month of September, an attacker operating under the pseudonym "kohlersbtuh15", attempted to exploit the open-source community by uploading a series of malicious packages to the PyPi package manager. Based on the names of these packages and the code contained within them, it appears that this attacker targeted developers that use Aliyun services (Alibaba Cloud), telegram, and AWS.

checkmarx EN 2023 PyPi Supply-chain-attack kohlersbtuh15
page 129 / 207
4720 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio