Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 138 / 237
iPhone: Why Apple is working hard to break into its own phones https://www.independent.co.uk/tech/iphone-apple-security-software-lockdown-mode-b2450192.html
24/11/2023 16:02:11
QRCode
archive.org
thumbnail

In a secret location in Paris, Apple has hired an elite team of laser-wielding hackers to try and crack its iPhones. Andrew Griffin gets an inside look

independent.co.uk EN 2023 Apple iPhone Internal
USB worm unleashed by Russian state hackers spreads worldwide https://arstechnica.com/security/2023/11/normally-targeting-ukraine-russian-state-hackers-spread-usb-worm-worldwide/
24/11/2023 14:32:45
QRCode
archive.org
thumbnail

LitterDrifter's means of self-propagation are simple. So why is it spreading so widely?

arstechnica EN 2023 Russia-Ukraine-war USB worm LitterDrifter
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/
24/11/2023 13:49:34
QRCode
archive.org
thumbnail

Internet scans show 7,000 devices may be vulnerable. The true number could be higher.

arstechnica EN 2023 0-day routers cameras mirai
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets https://blog.aquasec.com/the-ticking-supply-chain-attack-bomb-of-exposed-kubernetes-secrets
24/11/2023 12:16:29
QRCode
archive.org
thumbnail

Aqua Nautilus researchers found exposed Kubernetes secrets that pose a critical threat of supply chain attack to hundreds of organizations and OSS.

aquasec EN 2023 secrets Kubernetes disclosure Supply-chain-attack
Secrétariat d’État à la politique de sécurité (SEPOS) et Office fédéral de la cybersécurité (OFCS) : le Conseil fédéral fixe des bases légales https://www.admin.ch/gov/fr/accueil/documentation/communiques.msg-id-98807.html
23/11/2023 17:28:00
QRCode
archive.org

Informations actuelles de l'administration. Tous les communiqués de l'administration fédérale, des départements et des offices.

admin.ch FR CH Suisse Communiqué SEPOS Office fédéral OFCS sécurité cybersécurité Conseilfédéral
How to bypass Windows Hello, log into vulnerable laptops https://www.theregister.com/2023/11/22/windows_hello_fingerprint_bypass/
23/11/2023 06:48:12
QRCode
archive.org
thumbnail

Hardware security hackers have detailed how it's possible to bypass Windows Hello's fingerprint authentication and login as someone else – if you can steal or be left alone with their vulnerable device.

The research was carried out by Blackwing Intelligence, primarily Jesse D'Aguanno and Timo Teräs, and was commissioned and sponsored by Microsoft's Offensive Research and Security Engineering group. The pair's findings were presented at the IT giant's BlueHat conference last month, and made public this week. You can watch the duo's talk below, or dive into the details in their write-up here.

theregister EN 2023 biometric fingerprint bypass Windows Hello
Le Conseil fédéral clarifie les tâches de l’Office fédéral de la cybersécurité https://www.ictjournal.ch/news/2023-11-22/le-conseil-federal-clarifie-les-taches-de-loffice-federal-de-la-cybersecurite
22/11/2023 18:56:42
QRCode
archive.org
thumbnail

Le Conseil fédéral a précisé les tâches qui vont incomber, dès le 1er janvier 2024, aux nouvelles unités administratives impliquées dans le domaine de la cybersécurité. L’Office fédéral de la cybersécurité (OFCS) reprendra «dans les grandes lignes» les tâches de l’actuel NCSC. Une nouvelle entité, le Secrétariat d’Etat à la politique de sécurité (SEPOS), sera compétente en matière de politique de sécurité et de sécurité de l’information.

ictjournal FR CH 2023 Conseil fédéral NCSC cybersécurité OFCS Suisse
CVE-2023-46604 (Apache ActiveMQ) Vulnerability Exploited to Infect Systems With Cryptominers and Rootkits https://www.trendmicro.com/en_us/research/23/k/cve-2023-46604-exploited-by-kinsing.html
22/11/2023 17:15:12
QRCode
archive.org
thumbnail

We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner.

trendmicro eport E N2023 CVE-2023-46604 Apache ActiveMQ
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors https://unit42.paloaltonetworks.com/two-campaigns-by-north-korea-bad-actors-target-job-hunters/
22/11/2023 15:44:33
QRCode
archive.org
thumbnail

Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage.

unit42 EN 2023 North-Korea Job-Related Campaigns threat-actor job-seeking malware espionage
Business Continuity in a Box https://www.cyber.gov.au/smallbusiness/business-continuity-in-a-box
22/11/2023 14:55:16
QRCode
archive.org

Business Continuity in a Box – developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), with contributions from the United States Cybersecurity and Infrastructure Security Agency (CISA) – assists organisations with swiftly and securely standing up critical business functions during or following a cyber incident. By using Business Continuity in a Box, organisations can maintain or re-establish the basic functions needed to operate a business while responding to the issues affecting their existing systems.

Cyber.gov.au EN 2023 guide business-continuity cyber-incident
Meet the Unique New "Hacking" Group: AlphaLock https://www.bleepingcomputer.com/news/security/meet-the-unique-new-hacking-group-alphalock/
22/11/2023 14:34:20
QRCode
archive.org
thumbnail

It’s not every day that you discover a new Russian hacking group complete with a song and dance routine (performed live), a sleek user interface (with dark mode!) and a clearly thought-out business model. But that is exactly what our security research team discovered with “AlphaLock,” a “pentesting training organization” that trains hackers and then monetizes their services through a dedicated affiliate program.
...
We originally discovered their group through a public Telegram channel that has since become private. This post will serve as a detailed investigation and description of one of the most brazen, strange, and best marketed cybercrime groups to appear in 2023.

  • Cybercrime sophistication and commoditization continues to grow: We now have a real life example of a threat group that seeks to create its own talent pool through a training program, goes to extensive lengths to market itself, and plans to monetize this through a hacker-for-hire scheme. The level of technical sophistication required to do this isn’t very high, but the level of organizational sophistication and business acumen is quite interesting.
  • Ransomware isn’t the only game in town: Cybercriminals typically choose the path of least resistance that is most likely to prove profitable, this has been increasingly the case as the cybercrime ecosystem has evolved into a functional market economy. However AlphaLock represents another potential method to both monetize and democratize cybercrime. This could be a particularly interesting model alternative for ransomware groups if the U.S. follows through with the proposal of banning ransomware payments.
  • A Technical Threat Actor Supply Shortage? One of the most fascinating things about AlphaLock is they want to create a pipeline of talent to populate their hacker marketplace. This suggests that there may be limitations on the supply of talented threat actors that have the required degree of sophistication to the point where they have tried to build their own pipeline of actors.
  • The Brand: Our researchers have noted an increasing focus on group “brand” and identity among financially motivated threat groups. AlphaLock has clearly made significant investments in time to create a brand and reputation for itself. Notice in the final post they even advertise that they are looking to hire someone to market themselves on Telegram and social media.
  • Blurred Lines: Many security practitioners have often assumed that threat actors primarily operate on the dark web. In most cases today this isn’t the case. There are increasingly blurred lines between clear web sites, Tor, and social media applications such as Telegram that create easy avenues for threat actors to congregate and communicate.
bleepingcomputer EN 2023 AlphaLock Cybersecurity Flare Penetration-Testing Telegram Threat-Intelligence Russia
Artificial Intelligence in Education – Legal Best Practices https://www.zh.ch/en/wirtschaft-arbeit/wirtschaftsstandort/innovation-sandbox/ki-in-der-bildung-rechtliche-best-practices.html#-247839749
22/11/2023 14:27:06
QRCode
archive.org
thumbnail

Artificial intelligence offers potential for individualised learning in education and supports teachers in repetitive tasks such as corrections. However, there are regulatory and ethical challenges. The guide is primarily aimed at providers, but can also offer insightful insights to school leaders.

zh.ch EN 2023 Education legal AI
Building an Exploit for FortiGate Vulnerability… https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997
22/11/2023 10:01:36
QRCode
archive.org
thumbnail

Learn how Bishop Fox built a POC exploit for the pre-authentication remote code injection vulnerability in the Fortinet SSL VPN published by Lexfo.

bishopfox EN 2023 PoC Fortinet SSL VPN CVE-2023-27997 exploit
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days
22/11/2023 09:52:18
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild.

akamai EN 2023 Research Threat-Intelligence botnet zero-day mirai china-cat
Understanding the Phobos affiliate structure and activity https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/
22/11/2023 09:28:09
QRCode
archive.org
thumbnail

Cisco Talos identified the most prolific Phobos variants, TTPs and affiliate structure, based on their activity and analysis of over 1,000 samples from VirusTotal dating back to 2019. We assess with moderate confidence Eking, Eight, Elbie, Devos and Faust are the most common variants

talosintelligence EN 2023 analysis phobos ransomware
ClearFake Malware Analysis | malware-analysis https://rmceoin.github.io/malware-analysis/clearfake/
22/11/2023 09:16:28
QRCode
archive.org

There are several malicious fake updates campaigns being run across thousands of compromised websites. Here I will walk through one with a pattern that doesn’t match with others I’ve been tracking. This campaign appears to have started around July 19th, 2023. Based on a search on PublicWWW of the injection base64 there are at least 434 infected sites.

I’m calling this one ClearFake until I see a previously used name for it. The name is a reference to the majority of the Javascript being used without obfuscation. I say majority because base64 is used three times. That’s it. All the variable names are in the clear, no obfuscation on them.

One noticeable difference from SocGholish is that there appears to be no tracking of visits by IP or cookies. As an analyst you can you go back to the compromised site over and over coming from the same IP and not clearing your browser cache. This also means the site owner is more likely to see the infection as well.

rmceoin EN 2023 fake updates campaigns browsers ClearFake analysis
Atomic Stealer distributed to Mac users via fake browser updates https://www.malwarebytes.com/blog/threat-intelligence/2023/11/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates
22/11/2023 08:30:47
QRCode
archive.org
thumbnail

Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users.

malwarebytes EN 2023 macos Stealer fake browser updates
Les Suisses préoccupés par leur cybersécurité même s'ils sont rarement touchés https://www.ictjournal.ch/etudes/2023-11-21/les-suisses-preoccupes-par-leur-cybersecurite-meme-sils-sont-rarement-touches
21/11/2023 20:39:35
QRCode
archive.org
thumbnail

Peu de Suisses sont victimes de cyberattaques. Ils sont conscients des risques sur internet et estiment prendre suffisamment de mesures de protection pour se sentir en sécurité en surfant sur le web, selon une nouvelle étude mandatée par Digitalswitzerland et des organisations partenaires.

ictjournal CH FR 2023 Suisse statistiques cyberattaques préoccupation
MAR-10478915-1.v1 Citrix Bleed https://www.cisa.gov/news-events/analysis-reports/ar23-325a
21/11/2023 20:32:29
QRCode
archive.org

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

cisa EN 2023 CitrixBleed analysis IoCs
Rhysida ransomware gang claims attack on British Library • The Register https://www.theregister.com/2023/11/20/rhysida_claims_british_library_ransomware/
21/11/2023 07:19:43
QRCode
archive.org
thumbnail

The Rhysida ransomware group says it's behind the highly disruptive October cyberattack on the British Library, leaking a snippet of stolen data in the process.

A low-res image shared to its leak site appears to show a handful of passport scans, along with other documents, some of which display the format of HMRC employment documents.

theregister EN 2023 Rhysida ransomware British Library, Data-theft
page 138 / 237
4723 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio