Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 13 / 76
1513 résultats taggé 2024  ✕
Schneider Electric confirms dev platform breach after hacker steals data https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/
04/11/2024 20:31:15
QRCode
archive.org
thumbnail

Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company's JIRA server.

bleepingcomputer EN 2024 Data-Breach Developer-Environment Jira Schneider-Electric Security InfoSec Computer-Security
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging - Securonix https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
04/11/2024 16:55:53
QRCode
archive.org
thumbnail

In a rather novel attack chain, attackers deploy a custom-made emulated QEMU Linux box to persist on endpoints, delivered through phishing emails.

securonix EN 2024 Linux CRON#TRAP QEMU phishing emails
The story behind HISAA https://www.theregister.com/2024/10/29/hold_the_story_behind_the/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
04/11/2024 08:44:10
QRCode
archive.org
thumbnail

Health care breaches lead to legislation
Highlights of the new standard include:

  • Performing and documenting a security risk analysis of exposure
  • Documentation of a business continuity plan (BCP)
  • Stress test of resiliency and documentation of any planned changes to the BCP
  • A signed statement by both the CEO and CISO of compliance
  • A third-party audit to certify compliance (no later than six months after enactment)
theregister EN 2024 HISAA standard legal US health legislation
SmokeBuster Tool https://www.zscaler.com/blogs/security-research/smokebuster-keeping-systems-smokeloader-free
04/11/2024 07:06:54
QRCode
archive.org
thumbnail
  • ThreatLabz has developed a tool named SmokeBuster to detect, analyze, and remediate infections.
  • SmokeBuster supports 32-bit and 64-bit instances of SmokeLoader and versions 2017-2022. The tool is compatible with Windows 7 to Windows 11.
  • SmokeLoader is a malware downloader that originated in 2011. The malware is primarily designed to deliver second-stage payloads, which include information stealers and ransomware.
  • Despite a major disruption by Operation Endgame in May 2024, SmokeLoader continues to be used by numerous threat groups largely due to numerous cracked versions publicly available on the internet.
  • The last four versions of SmokeLoader contain coding flaws that significantly impact an infected system’s performance.
zscaler EN 2024 tool SmokeBuster SmokeLoader Operation-Endgame
Censorship Attack against the Tor network https://osservatorionessuno.org/blog/2024/10/censorship-attack-against-the-tor-network/
04/11/2024 07:00:25
QRCode
archive.org

In the last few days, many Tor relay operators - mainly hosting relay nodes on providers like Hetzner - began receiving abuse notices.
All the abuses reported many failed SSH login attempts - part of a brute force attack - coming from their Tor relays.

Tor relays normally only transport traffic between a guard and an exit node of the Tor network, and per-se should not perform any SSH connections to internet-facing hosts, let alone performing SSH brute force attacks.

osservatorionessuno EN 2024 Tor network spoofing attack relays SSH
Massive hack-for-hire scandal rocks Italian political elites https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/
04/11/2024 06:58:50
QRCode
archive.org
thumbnail

The president and former prime minister were among targets of hackers selling highly sensitive data.

politico EN 2024 Italy Breaches Giorgia Data Exfiltration hack-for-hire
Un prestataire des missions locales victime d’un acte de cyber-malveillance https://travail-emploi.gouv.fr/un-prestataire-des-missions-locales-victime-dun-acte-de-cyber-malveillance
04/11/2024 06:56:10
QRCode
archive.org

Le ministère du Travail et de l’Emploi a pris connaissance de la violation du système d’information, porté par un prestataire de services, utilisé par le réseau des Missions locales.

Cette cyber-attaque a eu lieu dans la nuit du 23 octobre 2024 au 24 octobre 2024.

Des investigations sont en cours chez le prestataire pour connaître l’origine de cet évènement. La sécurité des systèmes d’information du réseau des Missions locales elles-mêmes n’est pas en cause.

travail-emploi.gouv.fr FR 2024 Communiqué ministère Missions locales prestataire
Cyber attack on pharmaceutical distributor AEP https://www.heise.de/en/news/Cyber-attack-on-pharmaceutical-distributor-AEP-10001220.html
04/11/2024 06:55:28
QRCode
archive.org
thumbnail

AEP GmbH was the victim of a targeted cyber attack on October 28, which led to the partial encryption of the company's IT systems. The company's own security systems detected the attack. The company provides information about this on its website.

heise EN 2024 Germany ransomware Digital Pharmaindustrie Lösegeld Health Apotheken
DDoS site Dstat.cc seized and two suspects arrested in Germany https://www.bleepingcomputer.com/news/security/ddos-site-dstatcc-seized-and-two-suspects-arrested-in-germany/
01/11/2024 16:17:33
QRCode
archive.org
thumbnail

The Dstat.cc DDoS review platform has been seized by law enforcement, and two suspects have been arrested after the service helped fuel distributed denial-of-service attacks for years.

bleepingcomputer EN 2024 Arrest BKA DDoS Dstat.cc Germany Operation-PowerOff
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack https://www.wired.com/story/synology-zero-click-vulnerability/
01/11/2024 16:06:26
QRCode
archive.org
thumbnail

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

wired EN 2024 Synology photos vulnerabilities RCE Pwn2Own critical vulnerability
Botnet 7777: Are You Betting on a Compromised Router? https://www.team-cymru.com/post/botnet-7777-are-you-betting-on-a-compromised-router
01/11/2024 10:20:17
QRCode
archive.org
thumbnail

Discover the latest insights on the Quad7 / 7777 botnet in our detailed analysis. Learn about the expansion of this resilient threat, its targeting patterns, and proactive measures to defend against compromised routers. Stay informed with our up-to-date findings and recommendations.

team-cymru EN 2024 Quad7 analysis botnet
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/
01/11/2024 10:18:13
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet CovertNetwork-1658 analysis
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/
01/11/2024 10:01:36
QRCode
archive.org
thumbnail

Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source of these password spray attacks to a network of compromised devices we track as CovertNetwork-1658, also known as xlogin and Quad7 (7777). Microsoft is […]

microsoft EN 2024 Storm-0940 Quad7 CovertNetwork-1658 analysis
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/
31/10/2024 16:27:18
QRCode
archive.org
thumbnail

Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices

sophos EN 2024 investigation China-based perimeter devices TTPs China APT
Every Doggo Has Its Day: Unleashing the Xiū Gǒu Phishing Kit https://www.netcraft.com/blog/doggo-threat-actor-analysis/
31/10/2024 15:02:01
QRCode
archive.org
thumbnail

Key data  This article explores Netcraft’s research into Xiū gǒu (修狗), a phishing kit in use since at least September 2024 to deploy phishing campaigns ...

netcraft EN 2024 analysis Xiū-gǒu phishing kit
Update your iPhone, Mac, Watch: Apple issues patches for several vulnerabilities | Malwarebytes https://www.malwarebytes.com/blog/news/2024/10/update-your-iphone-mac-watch-apple-issues-patches-for-several-vulnerabilities
31/10/2024 11:01:13
QRCode
archive.org
thumbnail

Apple has issued patches for several of its operating systems. The ones for iOS and iPadOS deserve your immediate attention.

malwarebytes EN 2024 Apple macOS iOS patch iPadOS CVE-2024-44274 CVE-2024-44282 CVE-2024-40867
Amazon identified internet domains abused by APT29 https://aws.amazon.com/fr/blogs/security/amazon-identified-internet-domains-abused-by-apt29/
31/10/2024 08:55:15
QRCode
archive.org
thumbnail

APT29 aka Midnight Blizzard recently attempted to phish thousands of people. Building on work by CERT-UA, Amazon recently identified internet domains abused by APT29, a group widely attributed to Russia’s Foreign Intelligence Service (SVR). In this instance, their targets were associated with government agencies, enterprises, and militaries, and the phishing campaign was apparently aimed at […]

amazon EN 2024 APT29 MidnightBlizzard attribution rdp spear-phishing
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/
31/10/2024 08:54:19
QRCode
archive.org
thumbnail

Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available. Based on our investigation of previous Midnight […]

microsoft EN 2024 APT29 MidnightBlizzard rdp spear-phishing
ClickFix tactic: The Phantom Meet https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/
30/10/2024 14:39:58
QRCode
archive.org
thumbnail

Analyse the ClickFix tactic and related campaigns. Uncover a ClickFix campaign impersonating Google Meet and cybercrime infrastructure.

sekoia EN 2024 ClickFix campaigns Google Meet
Attacker Abuses Victim Resources to Reap Rewards from Titan Network https://www.trendmicro.com/en_us/research/24/j/titan-network.html
30/10/2024 14:37:36
QRCode
archive.org
thumbnail
  • Trend Micro researchers observed an attacker exploiting the Atlassian Confluence vulnerability CVE-2023-22527 to achieve remote code execution for cryptomining via the Titan Network.
  • The malicious actor used public IP lookup services and various system commands to gather details about the compromised machine.
  • The attack involved downloading and executing multiple shell scripts to install Titan binaries and connect to the Titan Network with the attacker’s identity.
  • The malicious actor connects compromised machines to the Cassini Testnet, which allows them to participate in the delegated proof of stake system for reward tokens.
trendmicro EN 2024 Titan Network Confluence exploitation Atlassian Confluence vulnerability CVE-2023-22527
page 13 / 76
4514 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio