Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 14 / 59
1170 résultats taggé 2023  ✕
Microsoft offers politicians protection against deepfakes https://www.theverge.com/2023/11/8/23951955/microsoft-elections-generative-ai-content-watermarks
08/11/2023 19:07:07
QRCode
archive.org
thumbnail

Microsoft will launch digital watermarking tools to combat deep fakes and offer services to political campaigns for cybersecurity and using AI.

theverge EN 2023 US Microsoft deepfakes elections
Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms https://www.sentinelone.com/labs/predator-ai-chatgpt-powered-infostealer-takes-aim-at-cloud-platforms/
08/11/2023 19:02:52
QRCode
archive.org
thumbnail

An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services.

sentinelone EN 2023 PredatorAI infostealer Telegram cloud
Infomaniak intègre une IA souveraine à son service d'e-mails https://www.it-connect.fr/infomaniak-integre-une-ia-souveraine-a-son-service-de-mails/
08/11/2023 18:48:19
QRCode
archive.org
thumbnail

Le service mail de la kSuite d'Infomaniak bénéficie d'une IA souveraine capable de vous accompagner dans la rédaction ou la traduction des messages.

it-connect.fr FR CH 2023 Infomaniak kSuite A souveraine
Python obfuscation traps https://checkmarx.com/blog/python-obfuscation-traps/
08/11/2023 18:39:45
QRCode
archive.org
thumbnail

In the realm of software development, open-source tools and packages play a pivotal role in simplifying tasks and accelerating development processes. Yet, as the community grows, so does the number of bad actors looking to exploit it. A recent example involves developers being targeted by seemingly legitimate Python obfuscation packages that harbor malicious code.

checkmarx EN 2023 Python obfuscation Supply-chain-attack
Common Vulnerability Scoring System https://www.first.org/cvss/v4-0/
08/11/2023 12:17:41
QRCode
archive.org
thumbnail

CVSS version 4.0 is the next generation of the Common Vulnerability Scoring System standard.

first EN 2023 Common Vulnerability Scoring System v4-0 CVSS
ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections | by Amy L. Robertson https://medium.com/mitre-attack/attack-v14-fa473603f86b
08/11/2023 12:16:18
QRCode
archive.org
thumbnail

ATT&CK has been brewing up something eerie for this Halloween — a release so hauntingly powerful that it will send a chill down the spine of even the most formidable adversaries. As v14 emerges from…

mitre-attack EN 2023 v14
Jamf Threat Labs Discovers Malware from BlueNoroff https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/
07/11/2023 18:49:27
QRCode
archive.org
thumbnail

Newly discovered later-stage malware from BlueNoroff APT group targets macOS with characteristics similar to their RustBucket campaign.

jamf EN 2023 Malware macOS BlueNoroff RustBucket analysis
Critical Atlassian Confluence bug exploited in Cerber ransomware attacks https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-bug-exploited-in-cerber-ransomware-attacks/
06/11/2023 18:54:27
QRCode
archive.org
thumbnail

Attackers are exploiting a recently patched and critical severity Atlassian Confluence authentication bypass flaw to encrypt victims' files using Cerber ransomware.

bleepingcomputer EN 2023 Atlassian Authentication-Bypass Cerber Confluence Ransomware CVE-2023-22518
Not so lucky: BlackCat is back! https://research.nccgroup.com/2023/10/31/unveiling-the-dark-side-a-deep-dive-into-active-ransomware-families/
06/11/2023 18:35:02
QRCode
archive.org
thumbnail

While the main trend in the cyber threat landscape in recent months has been MoveIt and Cl0p, NCC Groups’ Cyber Incident Response Team have also been handling multiple different ransomware groups over the same period.

In the ever-evolving cybersecurity landscape, one consistent trend witnessed in recent years is the unsettling rise in ransomware attacks. These nefarious acts of digital extortion have left countless victims scrambling to safeguard their data, resources, and even their livelihoods. To counter this threat, every person in the cyber security theatre has a responsibility to shine light on current threat actor Tactics, Techniques and Procedures (TTP’S) to assist in improving defences and the overall threat landscape.

nccgroup EN 2023 TTP BlackCat D0nut Medusa NoEscape
Discord will switch to temporary file links to block malware delivery https://www.bleepingcomputer.com/news/security/discord-will-switch-to-temporary-file-links-to-block-malware-delivery/
06/11/2023 06:43:12
QRCode
archive.org
thumbnail

Discord will switch to temporary file links for all users by the end of the year to block attackers from using its CDN (content delivery network) for hosting and pushing malware.

bleepingcomputer EN 2023 Delivery Computer CDN Security InfoSec Hyperlink DMALocker Content Discord Network
AI companies have all kinds of arguments against paying for copyrighted content https://www.theverge.com/2023/11/4/23946353/generative-ai-copyright-training-data-openai-microsoft-google-meta-stabilityai
05/11/2023 13:48:35
QRCode
archive.org
thumbnail

The biggest companies in AI aren’t interested in paying to use copyrighted material as training data, and here are their reasons why.

theverge EN 2023 AI copyright companies ChatGPT
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel https://www.uptycs.com/blog/ghostlocker-ransomware-ghostsec
05/11/2023 13:45:11
QRCode
archive.org
thumbnail

The hacker collective called GhostSec has unveiled an innovative Ransomware-as-a-Service (RaaS) framework called GhostLocker. They provide comprehensive assistance to customers interested in acquiring this service through a dedicated Telegram channel. Presently, GhostSec is focusing its attacks on Israel. This move represents a surprising departure from their past activities and stated agenda.

Uptycs EN 2023 GhostSec GhostLocker RaaS Telegram Israel
New macOS 'KandyKorn' malware targets cryptocurrency engineers https://www.bleepingcomputer.com/news/security/new-macos-kandykorn-malware-targets-cryptocurrency-engineers/
05/11/2023 11:22:34
QRCode
archive.org

A new macOS malware dubbed 'KandyKorn' has been spotted in a campaign attributed to the North Korean Lazarus hacking group, targeting blockchain engineers of a cryptocurrency exchange platform.

The attackers impersonate members of the cryptocurrency community on Discord channels to spread Python-based modules that trigger a multi-stage KandyKorn infection chain.

Elastic Security discovered and attributed the attacks to Lazarus based on overlaps with past campaigns concerning the employed techniques, network infrastructure, code-signing certificates, and custom Lazarus detection rules.

bleepingcomputer EN 2023 macOS Lazarus Discord Python-based cryptocurrency engineers Targeted
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604 https://www.rapid7.com/blog/post/2023/11/01/etr-suspected-exploitation-of-apache-activemq-cve-2023-46604/
04/11/2023 16:23:08
QRCode
archive.org
thumbnail

On October 27, Rapid7 Managed Detection & Response identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in 2 separate customer environments.

rapid7 EN 2023 CVE-2023-46604 Apache ActiveMQ
Four dozen countries declare they won't pay ransomware ransoms | CyberScoop https://cyberscoop.com/ransomware-ransom-pledge-pay/
04/11/2023 16:09:24
QRCode
archive.org
thumbnail

The coalition aims to encourage members to no longer pay ransoms demanded by criminal hacking groups to discourage attacks from taking place.

cyberscoop EN 2023 coalition ransomware pay
Apple 'Find My' network can be abused to steal keylogged passwords https://www.bleepingcomputer.com/news/apple/apple-find-my-network-can-be-abused-to-steal-keylogged-passwords/
04/11/2023 15:34:01
QRCode
archive.org
thumbnail

Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards.

The Find My network and application is designed to help users locate lost or misplaced Apple devices, including iPhones, iPads, Macs, Apple Watches, AirPods, and Apple Tags.

The service relies on GPS and Bluetooth data crowd-sourced from millions of Apple devices worldwide to find devices reported as lost or stolen, even if those are offline.

bleepingcomputer EN 2023 Apple Apple-Find-My Bluetooth Data-Exfiltration Find-My Keylogger Network
Send My: Arbitrary data transmission via Apple's Find My network | Positive Security https://positive.security/blog/send-my
04/11/2023 15:32:24
QRCode
archive.org
thumbnail

Apple AirTags: Arbitrary data can be uploaded from non-internet-connected devices by sending Find My BLE broadcasts to nearby Apple devices. We're releasing an ESP32 firmware that turns the microcontroller into an (upload only) modem, and a macOS application to retrieve, decode and display the uploaded data.

positive.security EN 2023 Apple AirTags Arbitrary data
New Microsoft Exchange zero-days allow RCE, data theft attacks https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/?s=09
04/11/2023 09:39:26
QRCode
archive.org
thumbnail

Microsoft Exchange is impacted by four zero-day vulnerabilities that attackers can exploit remotely to execute arbitrary code or disclose sensitive information on affected installations.

bleepingcomputer EN 2023 Microsoft Exchange RCE zero-day ZDI
ZDI-23-1578 | Zero Day Initiative https://www.zerodayinitiative.com/advisories/ZDI-23-1578/?s=09
04/11/2023 09:38:18
QRCode
archive.org

(0Day) Microsoft Exchange ChainedSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability

zerodayinitiative EN 2023 0-Day Microsoft Exchange ChainedSerializationBinder Deserialization RCE
Cyber experts and officials raise alarms about exploits against Citrix and Apache productsoited vulnerability (KEV) list. https://therecord.media/cyber-officials-raise-alarms-citrix-apache?s=09
03/11/2023 19:16:29
QRCode
archive.org

Several new vulnerabilities with critical severity scores are causing alarm among experts and cyber officials.

Zero-day bugs affecting products from Citrix and Apache have recently been added to the Cybersecurity and Infrastructure Security Agency’s (CISA) known exploited vulnerability (KEV) list.

Incident responders at the cybersecurity company Rapid7 warned of hackers connected to the HelloKitty ransomware exploiting a vulnerability affecting Apache ActiveMQ, classified as CVE-2023-46604. Apache ActiveMQ is a Java-language open source message broker that facilitates communication between servers.

therecord EN 2023 CVE-2023-46604 Apache ActiveMQ Citrix
page 14 / 59
4838 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn