Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 130 / 207
4136 résultats taggé EN  ✕
The evolution of Windows authentication https://techcommunity.microsoft.com/t5/windows-it-pro-blog/the-evolution-of-windows-authentication/ba-p/3926848
13/10/2023 09:18:12
QRCode
archive.org
thumbnail

Discover how we’re securing authentication and reducing NTLM usage in Windows.

microsoft EN 2023 NTLM authentication Windows legacy
Balada Injector Targets Unpatched tagDiv Plugin, Newspaper Theme & WordPress Admins https://blog.sucuri.net/2023/10/balada-injector-targets-unpatched-tagdiv-plugin-newspaper-theme-wordpress-admins.html
13/10/2023 09:13:15
QRCode
archive.org
thumbnail

Discover the latest waves of the ongoing Balada Injector malware campaign targeting unpatched tagDiv premium WordPress themes. Dive into the technical details of the injected scripts, explore their functionality, and understand the potential threats they pose to site administrators.

sucuri 2023 EN WP Wordpress Balada Injector tagDiv Plugin
Steam Adds Security Layer for Devs After Some Had Their Accounts Compromised and Malware Was Injected in Games https://wccftech.com/steam-adds-security-layer-for-devs-after-some-had-their-accounts-compromised-and-malware-was-injected-in-games
12/10/2023 18:23:12
QRCode
archive.org
thumbnail

Valve has added a new security layer for developers who publish their games on Steam after a few had their accounts hacked.

wccftech EN 2023 Valve MFA developers Steam hacked
The Predator Files: European Spyware Consortium Supplied Despots and Dictators https://www.spiegel.de/international/business/the-predator-files-european-spyware-consortium-supplied-despots-and-dictators-a-2fd8043f-c5c1-4b05-b5a6-e8f8b9949978
12/10/2023 12:58:15
QRCode
archive.org
thumbnail

The Intellexa Alliance is the name of the shady group of European companies that supplies dictators and despots with cyberweapons. The mass spyware attacks have also been lucrative for some in Germany.

spiegel EN 2023 spaware predator Intellexa
IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits | FortiGuard Labs https://www.fortinet.com/blog/threat-research/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits
11/10/2023 21:30:32
QRCode
archive.org
thumbnail

FortiGuard Labs unmasks IZ1H9 and explores the aggressive exploits in the Mirai-Based DDoS Campaign

fortinet EN 2023 mirai IZ1H9 ealink Zyxel devices TP-Link Archer Korenix Jetwave TOTOLINK
HTTP/2 Rapid Reset: deconstructing the record-breaking attack https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
10/10/2023 14:41:55
QRCode
archive.org
thumbnail

This post dives into the details of the HTTP/2 protocol, the feature that attackers exploited to generate the massive Rapid Reset attacks, and the mitigation strategies we took to ensure all our customers are protected

Cloudflare EN 2023 HTTP/2 protocol DDoS rapid-reset CVE-2023-44487
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages | Akamai https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer
09/10/2023 20:13:43
QRCode
archive.org
thumbnail

Akamai researchers have discovered a novel obfuscation technique that Magecart attackers are using to hide malicious code and infiltrate websites.

akamai EN 2023 magecart skimmer javascript 404
AI Risks https://www.schneier.com/blog/archives/2023/10/ai-risks.html
09/10/2023 19:15:15
QRCode
archive.org

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines, one would hope that the rapid gains in AI technology have also brought forth a unifying realization of the risks—and the steps we need to take to mitigate them.

Schneier EN 2023 AI Risks
23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews https://www.wired.com/story/23andme-credential-stuffing-data-stolen/
09/10/2023 06:49:57
QRCode
archive.org
thumbnail

At least a million data points from 23andMe accounts appear to have been exposed on BreachForums. While the scale of the campaign is unknown, 23andMe says it's working to verify the data.

wired EN 2023 23andme genetics security Ashkenazi Jews
90s Vulns In 90s Software (Exim) - Is the Sky Falling? https://labs.watchtowr.com/exim-0days-90s-vulns-in-90s-software/
08/10/2023 18:23:35
QRCode
archive.org
thumbnail

A few days ago, ZDI went public with no less than six 0days in the popular mail server Exim. Ranging from ‘potentially world-ending' through to ‘a bit of a damp squib’, these bugs were apparently discovered way back in June 2022 (!) - but naturally got caught up in the void between the ZDI and Exim for quite some time. Mysterious void.

labs.watchtowr EN 2023 Exim analysis CVE-2023-42115
Rules of engagement issued to hacktivists after chaos https://www.bbc.com/news/technology-66998064
08/10/2023 18:18:39
QRCode
archive.org
thumbnail

The Red Cross writes rules of engagement for civilian hackers as numbers rise

BBC 2023 EN rules engagement civilians CRC hackers red-cross
Android TV Boxes Infected with Backdoors, Compromising Home Networks https://www.hackread.com/android-tv-boxes-backdoors-home-networks/
08/10/2023 15:51:31
QRCode
archive.org
thumbnail
  • Cybersecurity Firm Human Security has discovered malware on dozens of streaming devices and iOS/Android apps.
  • A huge number of Android TV boxes contain malware capable of conducting ad fraud, creating fake accounts, and selling access to home networks.
  • Researchers found that the malware they have dubbed Badbox is not only tricky to detect but difficult to remove as well.
  • Android TV box users must prefer installing apps from reliable sources and keep their devices up-to-date.
  • Human Security has already shared details of its findings with concerned law enforcement agencies.
hackread EN 2023 Human-Security AndroidTV box malware Badbox
X-Force uncovers global NetScaler Gateway credential harvesting campaign https://securityintelligence.com/posts/x-force-uncovers-global-netscaler-gateway-credential-harvesting-campaign/
08/10/2023 13:16:54
QRCode
archive.org
thumbnail

In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related incident response engagements were associated with the use of stolen credentials.

securityintelligence EN 2023 NetScaler Gateway CVE-2023-3519 credential harvesting campaign
n their push for AI-generated content, tech companies are dancing on the edge between fucking around and finding out. https://www.vice.com/en/article/88xdez/generative-ai-is-a-disaster-and-companies-dont-seem-to-really-care
08/10/2023 12:58:58
QRCode
archive.org
thumbnail

Tech companies continue to insist that AI-generated content is the future as they release more trendy chatbots and image-generating tools. But despite reassurances that these systems will have robust safeguards against misuse, the screenshots speak for themselves.

vice 2023 EN AI-generated safeguards misuse AI
Google Online Security Blog: Expanding our exploit reward program to Chrome and Cloud https://security.googleblog.com/2023/10/expanding-our-exploit-reward-program-to.html?m=1
08/10/2023 11:35:26
QRCode
archive.org

In 2020, we launched a novel format for our vulnerability reward program (VRP) with the kCTF VRP and its continuation kernelCTF. For the first time, security researchers could get bounties for n-day exploits even if they didn’t find the vulnerability themselves. This format proved valuable in improving our understanding of the most widely exploited parts of the linux kernel. Its success motivated us to expand it to new areas and we're now excited to announce that we're extending it to two new targets: v8CTF and kvmCTF.

googleblog EN 2023 exploit reward program bugbounty
Genetics firm 23andMe says user data stolen in credential stuffing attack https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/
07/10/2023 09:44:05
QRCode
archive.org
thumbnail

23andMe has confirmed to BleepingComputer that it is aware of user data from its platform circulating on hacker forums and attributes the leak to a credential-stuffing attack.

bleepingcomputer EN 2023 23andMe credential-stuffing leak databreach genetics
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. https://nsfocusglobal.com/mirai-botnets-new-wave-hailbot-kiraibot-catddos-and-their-fierce-onslaught/
07/10/2023 01:20:26
QRCode
archive.org
thumbnail

Several new Mirai variant families were widely deployed in September 2023, among which hailBot, kiraiBot and catDDoS are the most active.

nsfocusglobal EN 2023 analysis Mirai catDDoS hailBot kiraiBot
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks https://www.securityweek.com/new-supermicro-bmc-vulnerabilities-could-expose-many-servers-to-remote-attacks/
05/10/2023 12:47:44
QRCode
archive.org
thumbnail

Supermicro has released BMC IPMI firmware updates to address multiple vulnerabilities impacting select motherboard models.

securityweek EN 2023 BMC Supermicro CVE-2023-40284 CVE-2023-40290
Binarly REsearch Uncovers Major Vulnerabilities in Supermicro BMCs https://binarly.io/posts/Binarly_REsearch_Uncovers_Major_Vulnerabilities_in_Supermicro_BMCs/index.html
05/10/2023 12:46:23
QRCode
archive.org
thumbnail

Behind the screens: An overview of hidden attack surfaces in powerful BMC chip infrastructure.

binarly EN 2023 BMC CVE-2023-40289 Supermicro
The evolutionary tale of a persistent Python threat  https://checkmarx.com/blog/the-evolutionary-tale-of-a-persistent-python-threat/
05/10/2023 12:41:52
QRCode
archive.org
thumbnail

Since early April 2023, an attacker has been relentlessly deploying hundreds of malicious packages through various usernames, accumulating nearly 75,000 downloads. Our team at Checkmarx’s Supply Chain Security has been on this malicious actor’s trail since early April, documenting each step of its evolution. We have been actively observing an attacker who seems to be evermore refining their craft. 

checkmarx EN 2023 Supply-chain-attack malicious packages Python
page 130 / 207
4720 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio