Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 139 / 213
4249 résultats taggé E*N  ✕
North Korea-backed hackers target security researchers with 0-day https://arstechnica.com/security/2023/09/north-korea-backed-hackers-target-security-researchers-with-0-day/
11/09/2023 23:03:12
QRCode
archive.org
thumbnail

Google researchers say currently unfixed vulnerability affects a popular software package.

arstechnica EN 2023 North-Korea security researchers 0-day popular software
Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/
10/09/2023 19:00:22
QRCode
archive.org

In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. Since then, a steady trickle of six-figure cryptocurrency heists targeting security-conscious…

krebsonsecurity EN 2023 LastPass Cracking Keys Stolen
The International Criminal Court Will Now Prosecute Cyberwar Crimes https://www.wired.com/story/icc-cyberwar-crimes/
10/09/2023 16:03:33
QRCode
archive.org
thumbnail

FOR YEARS, SOME cybersecurity defenders and advocates have called for a kind of Geneva Convention for cyberwar, new international laws that would create clear consequences for anyone hacking civilian critical infrastructure, like power grids, banks, and hospitals. Now the lead prosecutor of the International Criminal Court at the Hague has made it clear that he intends to enforce those consequences—no new Geneva Convention required. Instead, he has explicitly stated for the first time that the Hague will investigate and prosecute any hacking crimes that violate existing international law, just as it does for war crimes committed in the physical world.

wired EN 2023 International Criminal Court ICC Prosecute Cyberwar Crimes legal
Last Week on My Mac: How quickly can Apple release a security update? https://eclecticlight.co/2023/09/10/last-week-on-my-mac-how-quickly-can-apple-release-a-security-update/#like-74253
10/09/2023 11:18:45
QRCode
archive.org
thumbnail

We seldom get much insight into how long Apple takes to release an urgent update to macOS, but last week must have seen one of the quickest in recent times. By my reckoning, Apple’s engineers accomplished that in 6-10 days, across four of its operating systems, and with two distinct vulnerabilities.

eclecticlight EN 2023 Apple security update macos release
China’s iPhone ban expected to expand to more government agencies soon https://9to5mac.com/2023/09/07/china-iphone-ban-to-expand/
09/09/2023 12:18:12
QRCode
archive.org
thumbnail

A report yesterday revealed that China has banned government officials from using iPhones and other foreign technology within government agencies. Now, a report from Bloomberg says that this is only the start of China’s crackdown on iPhone, with a much broader set of restrictions also in the works.

9to5mac China ban iPhone EN 2023 government
Microsoft pledges legal protection for AI-generated copyright breaches https://www.ft.com/content/cd7f5391-bba5-4af1-8309-346eb2eafa02
08/09/2023 09:56:37
QRCode
archive.org

US tech giant will assume customers’ liability for material created by AI assistants in Word and coding tools

ft EN 2023 Microsoft AI legal AI-generated copyright breaches
Code Vulnerabilities Put Proton Mails at Risk https://www.sonarsource.com/blog/code-vulnerabilities-leak-emails-in-proton-mail/
07/09/2023 23:42:58
QRCode
archive.org
thumbnail

The Sonar Research team discovered critical code vulnerabilities in Proton Mail, Skiff and Tutanota. This post covers the technical details of the XSS vulnerability in Proton Mail.

sonarsource EN 2023 Code Vulnerabilities ProtonMail XSS Tutanota
MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 https://www.cisa.gov/news-events/analysis-reports/ar23-250a
07/09/2023 23:30:37
QRCode
archive.org

CISA received 4 files for analysis from an incident response engagement conducted at an Aeronautical Sector organization.

2 files (bitmap.exe, wkHPd.exe) are identified as variants of Metasploit (Meterpreter) and designed to connect and receive unencrypted payloads from their respective command and control (C2) servers. Note: Metasploit is an open source penetration testing software; Meterpreter is a Metasploit attack payload that runs an interactive shell. These executables are used as attack payloads to run interactive shells, allowing a malicious actor the ability to control and execute code on a system.

2 files (resource.aspx, ConfigLogin.aspx) are Active Server Pages (ASPX) web shells designed to execute remote JavaScript code on the victim server.

cisa EN 2023 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 CVE-2022-42475
Mac users targeted in new malvertising campaign delivering Atomic Stealer https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising
07/09/2023 21:36:22
QRCode
archive.org
thumbnail
  • Malicious ads for Google searches are targeting Mac users
  • Phishing sites trick victims into downloading what they believe is the app they want
  • The malware is bundled in an ad-hoc signed app so it cannot be revoked by Apple
  • The payload is a new version of the recent Atomic Stealer for OSX
malwarebytes EN 2023 macos AtomicStealer stealer tradingview
W3LL oiled machine: Group-IB uncovers covert BEC phishing empire targeting Microsoft 365 https://www.group-ib.com/media-center/press-releases/w3ll-phishing-report/
07/09/2023 21:07:01
QRCode
archive.org

The report details the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now. Group-IB’s Threat Intelligence and Cyber Investigations teams have tracked the evolution of W3LL and uncovered that they played a major role in compromising Microsoft 365 business email accounts over the past 6 years. The threat actor created a hidden underground market, named W3LL Store, that served a closed community of at least 500 threat actors who could purchase a custom phishing kit called W3LL Panel, designed to bypass MFA, as well as 16 other fully customized tools for business email compromise (BEC) attacks. Group-IB investigators identified that W3LL’s phishing tools were used to target over 56,000 corporate Microsoft 365 accounts in the USA, Australia and Europe between October 2022 and July 2023. According to Group-IB’s rough estimates, W3LL’s Store’s turnover for the last 10 months may have reached $500,000. All the information collected by Group-IB’s cyber investigators about W3LL has been shared with relevant law enforcement organizations.

PDF Document

group-ib EN 2023 BEC phishing W3LL Microsoft365
Apple discloses 2 new zero-days exploited to attack iPhones, Macs https://www.bleepingcomputer.com/news/apple/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs/
07/09/2023 20:54:32
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year.

bleepingcomputer EN 2023 Apple Apple-Watch Code-Execution iOS iPhone Mac watchOS Zero-Day
How China Demands Tech Firms Reveal Hackable Flaws in Their Products https://www.wired.com/story/china-vulnerability-disclosure-law/
07/09/2023 20:53:58
QRCode
archive.org
thumbnail

Some foreign companies may be complying—potentially offering China’s spies hints for hacking their customers.

wired EN 2023 China Reveal Hackable Flaws disclosure product disclosure-law
Rockstar Games reportedly sold games with Razor 1911 cracks on Steam https://www.bleepingcomputer.com/news/gaming/rockstar-games-reportedly-sold-games-with-razor-1911-cracks-on-steam/
07/09/2023 09:31:11
QRCode
archive.org
thumbnail

In an ironic twist, Rockstar Games reportedly uses pirated software cracks to remove its DRM from some games they sell on Steam.

bleepingcomputer EN 2023 Cracks Piracy Razor-1911 Rockstar-Games Warez Gaming
Compromised Microsoft Key: More Impactful Than We Thought https://www.wiz.io/blog/storm-0558-compromised-microsoft-key-enables-authentication-of-countless-micr
07/09/2023 09:00:17
QRCode
archive.org
thumbnail

Our investigation of the security incident disclosed by Microsoft and CISA and attributed to Chinese threat actor Storm-0558, found that this incident seems to have a broader scope than originally assumed. Organizations using Microsoft and Azure services should take steps to assess potential impact.

wiz EN 2023 Microsoft Key OWA postmortem analysis Storm-0558
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs - SecurityWeek https://www.securityweek.com/developers-warned-of-malicious-pypi-npm-ruby-packages-targeting-macs/
06/09/2023 15:01:22
QRCode
archive.org
thumbnail

Malicious packages uploaded to PyPI, NPM, and Ruby repositories are targeting macOS users with information stealing malware.

securityweek EN 2023 macos phylum PyPI NPM Ruby Supply-Chain-Attack
Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers https://blog.phylum.io/malware-campaign-targets-npm-pypi-and-rubygems-developers/
06/09/2023 15:00:06
QRCode
archive.org
thumbnail

Phylum has identified a malware campaign spanning PyPI, npm and RubyGems. Delivering early stage malware to users.

phylum EN 2023 Supply-Chain-Attack npm PyPI RubyGems macOS
What's in a NoName? Researchers see a lone-wolf DDoS group https://therecord.media/noname-hacking-group-targets-ukraine-and-allies
06/09/2023 14:28:29
QRCode
archive.org
thumbnail

Every morning at roughly the same time, a Russian hacker group known as NoName057(16) carries out distributed denial-of-service (DDoS) attacks on European financial institutions, government websites or transportation services.

therecord EN 2023 NoName057(16) DDoS analysis
Okta customers targeted in social engineering scam https://www.scmagazine.com/news/okta-customers-targeted-in-social-engineering-scam
06/09/2023 14:23:10
QRCode
archive.org
thumbnail

Help desk staff duped into resetting MFA on Okta super admin accounts, allowing threat actors to move laterally across targeted organizations.

scmagazine EN 2023 Okta phishing MFA scam
Attackers access military data through fencing supplier https://www.theregister.com/2023/09/04/zaun_breach_windows_7/
06/09/2023 14:21:44
QRCode
archive.org
thumbnail

Irony, not barbed wire, cuts the deepest

theregister EN 2023 Zaun breach windows-7 win7 military LockBit
China Bans iPhone Use for Government Officials at Work https://www.wsj.com/world/china/china-bans-iphone-use-for-government-officials-at-work-635fe2f8
06/09/2023 14:19:20
QRCode
archive.org
thumbnail

The directive is the latest step in Beijing’s campaign to cut reliance on foreign technology and could hurt Apple’s business in the country.

wsj EN 2023 China iPhone ban Apple Officials
page 139 / 213
4832 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn