Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 139 / 207
4136 résultats taggé EN  ✕
Tenable CEO accuses Microsoft of negligence in addressing security flaw https://cyberscoop.com/tenable-microsoft-negligence-security-flaw/
04/08/2023 09:44:17
QRCode
archive.org
thumbnail

Cybersecurity veteran Amit Yoran says Microsoft has a culture of toxic obfuscation when it comes to addressing security threats.

CyberScoop EN 2023 Amit-Yoran toxic Microsoft
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
04/08/2023 09:42:28
QRCode
archive.org
thumbnail

Rapid7 discovered a new vulnerability that allows unauthenticated attackers to access the API in unsupported versions of MobileIron Core (11.2 and below).

rapid7 EN 2023 CVE-2023-35082 MobileIron Core Unauthenticated API Access Vulnerability
Guarding the Bridge: New Attack Vectors in Azure AD Connect https://blog.sygnia.co/guarding-the-bridge-new-attack-vectors-in-azure-ad-connect
04/08/2023 09:41:15
QRCode
archive.org
thumbnail

By researching Azure AD Connect components, Sygnia was able to discover several attack vectors for extracting Connector credentials and domain users’ NT hashes, while avoiding common security solutions.

sygnia EN 2023 Azure AD Connect Attack Vectors NT hashes
Reptile Malware Targeting Linux Systems https://asec.ahnlab.com/en/55785/
04/08/2023 09:39:49
QRCode
archive.org
thumbnail

Reptile is an open-source kernel module rootkit that targets Linux systems and is publicly available on GitHub. [1] Rootkits are malware that possess the capability to conceal themselves or other malware. They primarily target files, processes, and network communications for their concealment. Reptile’s concealment capabilities include not only its own kernel module but also files, directories, file contents, processes, and network traffic. Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by offering a reverse...

ASEC EN 2023 Reptile open-source kernel module rootkit Linux
Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform https://www.tenable.com/security/research/tra-2023-25
04/08/2023 09:35:57
QRCode
archive.org

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets). Background The issue occurred as a result of insufficient access control to Azure Function hosts, which are launched as part of the creation and operation of custom connectors in Microsoft’s Power Platform (Power Apps, Power Automation).

tenable 2023 EN cross-tenant Cloud Microsoft-Power Platform
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch https://techcrunch.com/2023/08/03/russia-hackers-microsoft-teams-government/
03/08/2023 15:16:48
QRCode
archive.org
thumbnail

Russian state-sponsored hackers posed as technical support staff on Microsoft Teams to compromise dozens of global organizations, including government agencies.

techcrunch EN 2023 state-sponsored hackers technical-support Microsoft Teams APT29
Unpacking the Threats Within: The Hidden Dangers of .zip Domains https://decoded.avast.io/matejkrcma/unpacking-the-threats-within-the-hidden-dangers-of-zip-domains/
01/08/2023 10:38:08
QRCode
archive.org
thumbnail

Let's have a look at the threats brought by introduction of .zip TLD

avast EN 2023 TLD analysis
Into the tank with Nitrogen https://news.sophos.com/en-us/2023/07/26/into-the-tank-with-nitrogen/
31/07/2023 15:09:05
QRCode
archive.org
thumbnail

The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques

sophos analysis EN 2023 Nitrogen Malvertising initial-access
Tomcat Under Attack: Exploring Mirai Malware and Beyond https://blog.aquasec.com/tomcat-under-attack-investigating-the-mirai-malware
31/07/2023 15:02:28
QRCode
archive.org
thumbnail

Tomcat Vulnerability explore some of the techniques used by the Mirai botnet to exploit a single attack directed at one of our Apache Tomcat honeypots.

aquasec EN 2023 Tomcat Mirai botnet Apache
Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release https://www.sentinelone.com/blog/apple-crimeware-massive-rust-infostealer-campaign-aiming-for-macos-sonoma-ahead-of-public-release/
31/07/2023 14:57:55
QRCode
archive.org
thumbnail

Crimeware actors have launched an extensive campaign to target macOS users with malware disguised in multiple fake blockchain games.

sentinelone EN 2023 Apple Crimeware Rust Infostealer Campaign macOS Sonoma
GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads https://www.wiz.io/blog/ubuntu-overlayfs-vulnerability
31/07/2023 11:28:09
QRCode
archive.org
thumbnail

Wiz Research discovers CVE-2023-2640 & CVE-2023-32629, 2 privilege escalation vulnerabilities in Ubuntu's OverlayFS module impacting 40% of cloud workloads.

wiz EN 2023 CVE-2023-2640 CVE-2023-32629 Ubuntu OverlayFS
TETRA Radio Code Encryption Has a Flaw: A Backdoor https://www.wired.com/story/tetra-radio-encryption-backdoor/
30/07/2023 21:08:14
QRCode
archive.org
thumbnail

A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.

wired EN 2023 TETRA encryption cipher Flaw Backdoor police
Critical Infrastructure Companies Warned to Watch for Ongoing Cyberattack https://www.wsj.com/articles/critical-infrastructure-companies-warned-to-watch-for-ongoing-cyberattack-76508d83
30/07/2023 21:06:57
QRCode
archive.org
thumbnail

Hackers exploited a ‘zero-day’ flaw in Ivanti software to breach 12 ministries in Norway
Norway’s security officials warned around 20 critical infrastructure companies, other businesses and public agencies in the country they might also be vulnerable to a cyberattack disclosed Monday that hit 12 government ministries.

wsj EN 2023 zero-day Ivanti Norway
Ivanti warns of second vulnerability used in attacks on Norway gov’t https://therecord.media/ivanti-warns-of-second-vulnerability-norway-government-attack
30/07/2023 20:32:11
QRCode
archive.org
thumbnail

A second vulnerability affecting mobile endpoint management software from IT giant Ivanti has been discovered, according to a new advisory from the company.

therecord EN 2023 vulnerability Ivanti Norway
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations https://www.nytimes.com/2023/07/29/us/politics/china-malware-us-military-bases-taiwan.html?unlocked_article_code=CkVkJfakp3B7yHRuZMfKfipsda7-6JFWx9IzckPNhqGpXUH9wkg5Hz0_zsSF30A62KF2-m4wDYexBYh0DodCduFlIafxZPGjWG05vpAGmIa0oZpXizM95tt2FRIcvdyIuUHf6zYAZ0nF6n8IMPG_SqFu37Ogo0d4EzUr2MWJN6bKtqepWBNhy1AAPIUSbtJIzYiM2Rm4NCdybRabtSuS0t5Y6z3A5XAZGkjZjswwmQvv29GWlXltV_aW_VxqHwr07m1sYKMVB-ElbCdMX2k-wyuFN9dKO5G9V8j5gyMvdeE9APxRPHnNDPFaJCmn8RxhUJkAexPnuG2rYevd0TjsYEo9gROS7h9C-cSNVNESNrk7ofb46g&smid=nytcore-ios-share&referringSource=articleShare
29/07/2023 21:30:51
QRCode
archive.org
thumbnail

American intelligence officials believe the malware could give China the power to disrupt or slow American deployments or resupply operations, including during a Chinese move against Taiwan.

nytimes EN 2023 China Malware US resupply Taiwan Military Operations cyberwarfare
Two privilege escalation flaws affect 40% of Ubuntu workloads in OverlayFS https://www.scmagazine.com/news/two-privilege-escalation-flaws-affect-40-of-ubuntu-workloads-in-overlayfs
28/07/2023 23:28:50
QRCode
archive.org
thumbnail

Ubuntu patched the high-severity vulnerabilities on July 24 and recommends that users update their Ubuntu kernels.

scmagazine EN 2023 CVE-2023-32629 CVE-2023-2640 Ubuntu OverlayFS
Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws https://www.bleepingcomputer.com/news/security/almost-40-percent-of-ubuntu-users-vulnerable-to-new-privilege-elevation-flaws/
26/07/2023 23:40:45
QRCode
archive.org
thumbnail

Two Linux vulnerabilities introduced recently into the Ubuntu kernel create the potential for unprivileged local users to gain elevated privileges on a massive number of devices.

bleepingcomputer EN 2023 Code-Execution Kernel Linux Linux-Kernel Local-Privilege-Escalation Ubuntu Vulnerability CVE-2023-2640 CVE-2023-32629
Zenbleed https://lock.cmpxchg8b.com/zenbleed.html
26/07/2023 23:10:50
QRCode
archive.org

It turns out that with precise scheduling, you can cause some processors to recover from a mispredicted vzeroupper incorrectly!

This technique is CVE-2023-20593 and it works on all Zen 2 class processors, which includes at least the following products

cmpxchg8b EN 2023 googleprojectzero CVE-2023-20593 zen2 AMD zenbleed
Cryptojacking: Understanding and defending against cloud compute resource abuse https://www.microsoft.com/en-us/security/blog/2023/07/25/cryptojacking-understanding-and-defending-against-cloud-compute-resource-abuse/
26/07/2023 13:19:50
QRCode
archive.org
thumbnail

Cloud cryptojacking, a type of cyberattack that uses computing power to mine cryptocurrency, could result in financial loss to targeted organizations due to the compute fees that can be incurred from the abuse.

microsoft en 2023 report cryptojacking cloud defending
Apple issues third mobile OS update after zero-click spyware campaign https://cyberscoop.com/apple-os-update-spyware/
26/07/2023 13:18:01
QRCode
archive.org
thumbnail

The patch is the latest to address issues associated with what cybersecurity firm Kaspersky called Operation Triangulation.

cyberscoop EN 2023 Apple Triangulation zero-click iOS CVE-2023-38606
page 139 / 207
4721 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio