Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 134 / 207
4136 résultats taggé EN  ✕
MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 https://www.cisa.gov/news-events/analysis-reports/ar23-250a
07/09/2023 23:30:37
QRCode
archive.org

CISA received 4 files for analysis from an incident response engagement conducted at an Aeronautical Sector organization.

2 files (bitmap.exe, wkHPd.exe) are identified as variants of Metasploit (Meterpreter) and designed to connect and receive unencrypted payloads from their respective command and control (C2) servers. Note: Metasploit is an open source penetration testing software; Meterpreter is a Metasploit attack payload that runs an interactive shell. These executables are used as attack payloads to run interactive shells, allowing a malicious actor the ability to control and execute code on a system.

2 files (resource.aspx, ConfigLogin.aspx) are Active Server Pages (ASPX) web shells designed to execute remote JavaScript code on the victim server.

cisa EN 2023 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 CVE-2022-42475
Mac users targeted in new malvertising campaign delivering Atomic Stealer https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising
07/09/2023 21:36:22
QRCode
archive.org
thumbnail
  • Malicious ads for Google searches are targeting Mac users
  • Phishing sites trick victims into downloading what they believe is the app they want
  • The malware is bundled in an ad-hoc signed app so it cannot be revoked by Apple
  • The payload is a new version of the recent Atomic Stealer for OSX
malwarebytes EN 2023 macos AtomicStealer stealer tradingview
W3LL oiled machine: Group-IB uncovers covert BEC phishing empire targeting Microsoft 365 https://www.group-ib.com/media-center/press-releases/w3ll-phishing-report/
07/09/2023 21:07:01
QRCode
archive.org

The report details the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now. Group-IB’s Threat Intelligence and Cyber Investigations teams have tracked the evolution of W3LL and uncovered that they played a major role in compromising Microsoft 365 business email accounts over the past 6 years. The threat actor created a hidden underground market, named W3LL Store, that served a closed community of at least 500 threat actors who could purchase a custom phishing kit called W3LL Panel, designed to bypass MFA, as well as 16 other fully customized tools for business email compromise (BEC) attacks. Group-IB investigators identified that W3LL’s phishing tools were used to target over 56,000 corporate Microsoft 365 accounts in the USA, Australia and Europe between October 2022 and July 2023. According to Group-IB’s rough estimates, W3LL’s Store’s turnover for the last 10 months may have reached $500,000. All the information collected by Group-IB’s cyber investigators about W3LL has been shared with relevant law enforcement organizations.

PDF Document

group-ib EN 2023 BEC phishing W3LL Microsoft365
Apple discloses 2 new zero-days exploited to attack iPhones, Macs https://www.bleepingcomputer.com/news/apple/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs/
07/09/2023 20:54:32
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year.

bleepingcomputer EN 2023 Apple Apple-Watch Code-Execution iOS iPhone Mac watchOS Zero-Day
How China Demands Tech Firms Reveal Hackable Flaws in Their Products https://www.wired.com/story/china-vulnerability-disclosure-law/
07/09/2023 20:53:58
QRCode
archive.org
thumbnail

Some foreign companies may be complying—potentially offering China’s spies hints for hacking their customers.

wired EN 2023 China Reveal Hackable Flaws disclosure product disclosure-law
Rockstar Games reportedly sold games with Razor 1911 cracks on Steam https://www.bleepingcomputer.com/news/gaming/rockstar-games-reportedly-sold-games-with-razor-1911-cracks-on-steam/
07/09/2023 09:31:11
QRCode
archive.org
thumbnail

In an ironic twist, Rockstar Games reportedly uses pirated software cracks to remove its DRM from some games they sell on Steam.

bleepingcomputer EN 2023 Cracks Piracy Razor-1911 Rockstar-Games Warez Gaming
Compromised Microsoft Key: More Impactful Than We Thought https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr
07/09/2023 09:00:17
QRCode
archive.org
thumbnail

Our investigation of the security incident disclosed by Microsoft and CISA and attributed to Chinese threat actor Storm-0558, found that this incident seems to have a broader scope than originally assumed. Organizations using Microsoft and Azure services should take steps to assess potential impact.

wiz EN 2023 Microsoft Key OWA postmortem analysis Storm-0558
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs - SecurityWeek https://www.securityweek.com/developers-warned-of-malicious-pypi-npm-ruby-packages-targeting-macs/
06/09/2023 15:01:22
QRCode
archive.org
thumbnail

Malicious packages uploaded to PyPI, NPM, and Ruby repositories are targeting macOS users with information stealing malware.

securityweek EN 2023 macos phylum PyPI NPM Ruby Supply-Chain-Attack
Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers https://blog.phylum.io/malware-campaign-targets-npm-pypi-and-rubygems-developers/
06/09/2023 15:00:06
QRCode
archive.org
thumbnail

Phylum has identified a malware campaign spanning PyPI, npm and RubyGems. Delivering early stage malware to users.

phylum EN 2023 Supply-Chain-Attack npm PyPI RubyGems macOS
What's in a NoName? Researchers see a lone-wolf DDoS group https://therecord.media/noname-hacking-group-targets-ukraine-and-allies
06/09/2023 14:28:29
QRCode
archive.org
thumbnail

Every morning at roughly the same time, a Russian hacker group known as NoName057(16) carries out distributed denial-of-service (DDoS) attacks on European financial institutions, government websites or transportation services.

therecord EN 2023 NoName057(16) DDoS analysis
Okta customers targeted in social engineering scam https://www.scmagazine.com/news/okta-customers-targeted-in-social-engineering-scam
06/09/2023 14:23:10
QRCode
archive.org
thumbnail

Help desk staff duped into resetting MFA on Okta super admin accounts, allowing threat actors to move laterally across targeted organizations.

scmagazine EN 2023 Okta phishing MFA scam
Attackers access military data through fencing supplier https://www.theregister.com/2023/09/04/zaun_breach_windows_7/
06/09/2023 14:21:44
QRCode
archive.org
thumbnail

Irony, not barbed wire, cuts the deepest

theregister EN 2023 Zaun breach windows-7 win7 military LockBit
China Bans iPhone Use for Government Officials at Work https://www.wsj.com/world/china/china-bans-iphone-use-for-government-officials-at-work-635fe2f8
06/09/2023 14:19:20
QRCode
archive.org
thumbnail

The directive is the latest step in Beijing’s campaign to cut reliance on foreign technology and could hurt Apple’s business in the country.

wsj EN 2023 China iPhone ban Apple Officials
Zaun Data Breach https://www.zaun.co.uk/zaun-data-breach-update/
06/09/2023 14:03:07
QRCode
archive.org
thumbnail

Zaun Data Breach – Update. Zaun Ltd - fencing and gate manufacturers. Our ranges include perimeter and security fencing, gates and railings.

zaun EN 2023 databreach
Is macOS’s new XProtect behavioural security preparing to go live? https://eclecticlight.co/2023/09/04/is-macoss-new-xprotect-behavioural-security-preparing-to-go-live/
04/09/2023 20:56:50
QRCode
archive.org
thumbnail

Apple released its first update to its new behavioural security protection in XProtect Behaviour Service on 8 August, and again on 1 September. Here are the details.

eclecticlight EN 2023 macOS XProtect Behaviour Service
Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy https://www.wired.com/story/apple-csam-scanning-heat-initiative-letter/?s=09
03/09/2023 14:12:31
QRCode
archive.org
thumbnail

Child safety group Heat Initiative plans to launch a campaign pressing Apple on child sexual abuse material scanning and user reporting. The company issued a rare, detailed response on Thursday.

wired EN 2023 apple CSAM Decision Controversy privacy
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making https://flashpoint.io/blog/ransomed-uncertain-cyber-threat/
02/09/2023 16:12:21
QRCode
archive.org
thumbnail

Ransomed, originally an illicit forum, is a ransomware collective that is finding new ways to extort victims by leveraging GDPR laws.

flashpoint EN 2023 Ransomed illicit forum ransomware GDPR
Pay our ransom instead of a GDPR fine, cybercrime gang tells its targets https://therecord.media/ransomed-cybercrime-group-extortion-gdpr
02/09/2023 16:11:03
QRCode
archive.org
thumbnail

A group that operates through a data leak blog called Ransomed tells its alleged victims that shelling out an extortion payment is smarter than facing a government fine for a data breach.

therecord EN 2023 GDPR Ransomed ransom
Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs https://www.securityweek.com/healthcare-organizations-hit-by-cyberattacks-last-year-reported-big-impact-costs/
02/09/2023 16:06:40
QRCode
archive.org
thumbnail

Roughly 78% of healthcare organizations fell victim to a cyberattack over the past year and 60% of the incidents impacted care delivery

securityweek EN 2023 Healthcare Organizations Cyberattacks Hospitals
VMConnect supply chain attack continues, evidence points to North Korea - Security Boulevard https://securityboulevard.com/2023/08/vmconnect-supply-chain-attack-continues-evidence-points-to-north-korea/
01/09/2023 23:08:00
QRCode
archive.org
thumbnail

In early August, ReversingLabs identified a malicious supply chain campaign that the research team dubbed “VMConnect.” That campaign consisted of two dozen malicious Python packages posted to the Python Package Index (PyPI) open-source repository. The packages mimicked popular open-source Python tools, including vConnector, a wrapper module for pyVmomi VMware vSphere bindings; eth-tester, a collection of tools for testing Ethereum-based applications; and databases, a tool that gives asynchronous support for a range of databases.

securityboulevard EN 2023 Supply-Chain-Attack VMConnect PyPI
page 134 / 207
4720 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio