Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 142 / 207
4136 résultats taggé EN  ✕
Suspected key figure of notorious cybercrime group arrested in joint operation https://www.interpol.int/en/News-and-Events/News/2023/Suspected-key-figure-of-notorious-cybercrime-group-arrested-in-joint-operation
05/07/2023 19:07:32
QRCode
archive.org
thumbnail

Operation Nervone has dealt a significant blow to the OPERA1ER group.

interpol EN 2023 OPERA1ER cybercrime arrested
Clop Ransomware: History, Timeline, And Adversary Simulation https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation
05/07/2023 10:30:44
QRCode
archive.org
thumbnail

The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.

fourcore EN 2023 Cl0p History Timeline TTP ransomware analysis
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising https://thehackernews.com/2023/07/blackcat-operators-distributing.html
05/07/2023 09:30:26
QRCode
archive.org
thumbnail

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application.

thehackernews EN 2023 BlackCat Ransomware Disguised WinSCP Malvertising
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
Chinese Threat Actors Targeting Europe in SmugX Campaign https://research.checkpoint.com/2023/chinese-threat-actors-targeting-europe-in-smugx-campaign/
03/07/2023 21:47:15
QRCode
archive.org
thumbnail

In the last couple of months, Check Point Research (CPR) has been tracking the activity of a Chinese threat actor targeting Foreign Affairs ministries and embassies in Europe. Combined with other Chinese activity previously reported by Check Point Research, this represents a larger trend within the Chinese ecosystem, pointing to a shift to targeting European entities, with a focus on their foreign policy.

The activity described in this report, utilizes HTML Smuggling to target governmental entities in Eastern Europe. This specific campaign has been active since at least December 2022, and is likely a direct continuation of a previously reported campaign attributed to RedDelta (and also to Mustang Panda, to some extent).

checkpoint EN 2023 SmugX Europe research HTML Smuggling MustangPanda
Detecting Popular Cobalt Strike Malleable C2 Profile Techniques https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2/
03/07/2023 21:20:44
QRCode
archive.org
thumbnail

We examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.

unit42 EN 2023 CobaltStrike Malleable C2 Profile Techniques
Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator https://www.trendmicro.com/en_us/research/23/f/malvertising-used-as-entry-vector-for-blackcat-actors-also-lever.html
03/07/2023 08:56:21
QRCode
archive.org
thumbnail

We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.

trendmicro EN 2023 malware endpoints BlackCat WinSCP report SpyBoy GoogleAds
Decrypted: Akira Ransomware https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/
03/07/2023 07:29:08
QRCode
archive.org
thumbnail

Researchers for Avast have developed a decryptor for the Akira ransomware and released it for public download. The Akira ransomware appeared in March 2023 and since then, the gang claims successful attacks on various organizations in the education, finance and real estate industries, amongst others.

avast EN 2023 Akira decryptor Windows ransomware
NCSC marks 20th anniversary of first response to state-sponsored cyber attack https://www.ncsc.gov.uk/news/20th-anniversary-of-first-response-to-state-sponsored-cyber-attack
03/07/2023 07:27:20
QRCode
archive.org
thumbnail

In June 2003, GCHQ experts were involved in responding to a cyber attack against the UK Government for the first time.

NCSC.GOV.UK EN 2023 anniversary response APT cyber attack UK
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant https://www.securityweek.com/tsmc-says-supplier-hacked-after-ransomware-group-claims-attack-on-chip-giant/
03/07/2023 07:20:09
QRCode
archive.org
thumbnail

The LockBit ransomware group claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC), but the chip giant says only one of its suppliers was breached.

The notorious cybercrime group announced on Thursday on its website that it targeted TSMC, suggesting — based on the $70 million ransom demand — that it has stolen vast amounts of sensitive information. The victim was initially given seven days to respond, but the deadline has been extended to August 6 at the time of writing.

securityweek EN 2023 LockBit TSMC ransomware
High school changes every student’s password to ‘Ch@ngeme!’ https://techcrunch.com/2023/06/29/high-school-changes-every-students-password-to-chngeme/
02/07/2023 11:01:01
QRCode
archive.org
thumbnail

After a cybersecurity audit mistakenly reset everyone’s password, a high school changed every student’s password to “Ch@ngeme!” giving every student the chance to hack into any other student’s account, according to emails obtained by TechCrunch.

techcrunch EN 023 password Ch@ngeme! reset school
CVE-2023-27997 is Exploitable, and 69% of FortiGate… https://bishopfox.com/blog/cve-2023-27997-exploitable-and-fortigate-firewalls-vulnerable
01/07/2023 11:37:40
QRCode
archive.org
thumbnail

Bishop Fox internally developed an exploit for CVE-2023-27997, a heap overflow in FortiOS—the OS behind FortiGate firewalls—that allows remote code execution. There are 490,000 affected SSL VPN interfaces exposed on the internet, and roughly 69% of them are currently unpatched. You should patch yours now

bishopfox EN 2023 FortiGate CVE-2023-27997
TSMC confirms data breach after LockBit cyberattack on third-party supplier https://techcrunch.com/2023/06/30/tsmc-confirms-data-breach-after-lockbit-cyberattack-on-third-party-supplier/
01/07/2023 10:15:16
QRCode
archive.org
thumbnail

One of the world's biggest chipmakers confirmed a data breach after the LockBit ransomware gang targeted one of its third-party providers.

techcrunch EN 2023 security data-breach LockBit ransomware TSMC chipmaker
Malware Execution Method Using DNS TXT Record https://asec.ahnlab.com/en/54916/
30/06/2023 09:08:33
QRCode
archive.org
thumbnail

AhnLab Security Emergency response Center (ASEC) has confirmed instances where DNS TXT records were being utilized during the execution process of malware.

This is considered meaningful from various perspectives, including analysis and detection as this method has not been widely utilized as a means of executing malware.

ASEC EN 2023 DNS TXT malware analysis
Meduza Stealer or The Return of The Infamous Aurora Stealer https://russianpanda.com/2023/06/28/Meduza-Stealer-or-The-Return-of-The-Infamous-Aurora-Stealer/
29/06/2023 15:15:53
QRCode
archive.org

Meduza Stealer malware analysis

russianpanda EN 2023 analysis meduza Aurora Stealer malware
SEC notifies SolarWinds CISO and CFO of possible action in cyber investigation https://www.cybersecuritydive.com/news/sec-solarwinds-ciso-cfo-orion/653864/
29/06/2023 14:23:33
QRCode
archive.org
thumbnail

The Securities and Exchange Commission has notified the chief financial officer and CISO of SolarWinds about potential enforcement actions related to the 2020 cyberattack against the company’s Orion software platform, the company disclosed in a regulatory filing with the agency.

cybersecuritydive EN 2023 regulation SolarWinds CISO CFO cyberattack action justice legal
Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination https://medium.com/@callyso0414/tracing-ransomware-threat-actors-through-stylometric-analysis-and-chat-log-examination-23f0f84abba8
28/06/2023 21:24:41
QRCode
archive.org
thumbnail

I stumbled upon an intriguing concept presented by Will Thomas (BushidoToken) in his blog post titled “Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz.” This concept revolves around utilizing stylometry to identify potential modifications in new ransomware variants based on existing popular strains. If you’re interested, you can read the blog post here. (Notably, Will Thomas also appeared on Dark Net Diaries, discussing his tracking of the Revil ransomware.)

callyso0414 YUCA medium EN 2023 ransomware logs log chats Stylometric Analysis
Akira Ransomware Extends Reach to Linux Platform https://blog.cyble.com/2023/06/28/akira-ransomware-extends-reach-to-linux-platform/
28/06/2023 14:45:02
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs examines the Linux variant of Akira Ransomware and assesses its impact on various sectors.

cyble EN 2023 Akira Ransomware Linux
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies https://therecord.media/switzerland-cyber-espionage-russian-diplomatic-expulsions
28/06/2023 14:12:40
QRCode
archive.org
thumbnail

The efforts by governments in Europe and elsewhere to degrade Russia's human intelligence networks could have blowback in other areas, Swiss intelligence is warning.

therecord EN 2023 switzerland spies Russia Russia-Ukraine-war intelligence Warning
Kazakhstan - the world's last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure https://isc.sans.edu/diary/29988
28/06/2023 11:46:14
QRCode
archive.org

Kazakhstan - the world's last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure, Author: Jan Kopriva

sans EN 2023 Kazakhstan SSLv2 vulnerable internet
page 142 / 207
4721 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio