Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 143 / 213
4247 résultats taggé E*N  ✕
'DoubleDrive' attack turns Microsoft OneDrive into ransomware https://www.scmagazine.com/news/doubledrive-attack-turns-microsoft-onedrive-into-ransomware
16/08/2023 20:21:15
QRCode
archive.org
thumbnail

Microsoft's OneDrive file-sharing program can be used as ransomware to encrypt most of the files on a target machine without possibility of recovery, partly because the program is inherently trusted by Windows and endpoint detection and response programs (EDRs).

Presentation blackhat

scmagazine EN 2023 OneDrive Microsoft ransomware
This $70 device can spoof an Apple device and trick you into sharing your password https://techcrunch.com/2023/08/16/this-70-device-can-spoof-an-apple-device-and-trick-you-into-sharing-your-password/?guccounter=1&guce_referrer=aHR0cHM6Ly90LmNvLw&guce_referrer_sig=AQAAAKih2YQkaFDJihALtWMhORM2sEdkKOLlqiWEVzT6VyzsZ-1YWhyCt6wC0_kGLKNPtn5BPITBEeG_O2VC0IA-t4I5oEtbWk7WK-nVZq08UoqSUkrMux5uUNi_Hwj2en8YYZmH8ntyORsi4NNLTEO1Qp_P3MdkTydhce3aTflkVuCT
16/08/2023 19:00:40
QRCode
archive.org
thumbnail

Attendees at Def Con, one of the world’s largest hacking conferences, are used to weird shenanigans, such as a seemingly innocuous wall of computer screens that display people’s passwords sniffed over the conference Wi-Fi network. But at this year’s event, even conference veterans were confused and concerned when their iPhones started showing pop-up messages prompting them to connect their Apple ID or share a password with a nearby Apple TV.

techcrunch EN 2023 defcon Apple iPhone pop-up messages AppleTV
UK Electoral Commission had an unpatched Microsoft Exchange Server vulnerability https://doublepulsar.com/uk-electoral-commission-had-an-unpatched-microsoft-exchange-server-vulnerability-5436f3f5ec2c
16/08/2023 11:16:38
QRCode
archive.org

You have have read about the hack of the Electoral Commission recently. In this piece we take a look at what happened, show they were running Microsoft Exchange Server with Outlook Web App (OWA) facing the internet, and the unpatched vulnerability that presented.

doublepulsar EN 2023 UK Electoral Commission ProxyNotShell
Ransomware tracker: The latest figures [August 2023] https://therecord.media/ransomware-tracker-the-latest-figures
16/08/2023 10:13:30
QRCode
archive.org
thumbnail

The number of ransomware attacks posted on extortion websites shot up to a record high in July, with ransomware gangs publicly claiming more than 15 attacks per day on average.

In total there were 484 ransomware attacks in July, compared to 408 the previous month, according to data collected by Recorded Future from extortion sites, government agencies, news reports, hacking forums, and other sources.

therecord EN 2023 trends ransomware August2023
Meet NoEscape: Avaddon ransomware gang's likely successor https://www.bleepingcomputer.com/news/security/meet-noescape-avaddon-ransomware-gangs-likely-successor/
15/08/2023 14:36:37
QRCode
archive.org
thumbnail

The new NoEscape ransomware operation is believed to be a rebrand of Avaddon, a ransomware gang that shut down and released its decryption keys in 2021.

bleepingcomputer EN 2023 Avaddon Double-Extortion Encryptor NoEscape
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant https://www.mandiant.com/resources/blog/chinese-espionage-tactics
15/08/2023 09:19:01
QRCode
archive.org
thumbnail

Ways Chinese cyber espionage activity has increasingly leveraged strategies to evade detection.

mandiant EN 2023 espionage Stealth detection evasion UNC3886
Mac systems turned into proxy exit nodes by AdLoad https://cybersecurity.att.com/blogs/labs-research/mac-systems-turned-into-proxy-exit-nodes-by-adload
14/08/2023 15:51:24
QRCode
archive.org
thumbnail

AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been observed delivering a wide range of payloads throughout its existence. During AT&T Alien Labs’ investigation of its most recent payload, it was discovered that the most common component dropped by AdLoad during the past year has been a proxy application turning MacOS AdLoad victims into a giant, residential proxy botnet.

ATT Alien AT&T-Alien-Labs EN 2023 macOS AdLoad
An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass https://www.wired.com/story/apple-mac-background-task-management-flaw/
14/08/2023 07:20:04
QRCode
archive.org
thumbnail

The macOS Background Task Manager tool is supposed to spot potentially malicious software on your machine. But a researcher says it has troubling flaws.

wired EN 2023 Apple macOS Task-Manager PatrickWardle bypass
Want to pwn a satellite? Turns out it's surprisingly easy https://www.theregister.com/2023/08/11/satellite_hacking_black_hat/
14/08/2023 07:18:41
QRCode
archive.org
thumbnail

A study into the feasibility of hacking low-Earth orbit satellites has revealed that it's worryingly easy to do.

In a presentation at the Black Hat security conference in Las Vegas, Johannes Willbold, a PhD student at Germany's Ruhr University Bochum, explained he had been investigating the security of satellites. He studied three types of orbital machinery and found that many were utterly defenseless against remote takeover because they lack the most basic security systems.

theregister EN 2023 satellite hacking blackhat-conf
New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips https://www.wired.com/story/downfall-flaw-intel-chips/
13/08/2023 21:37:17
QRCode
archive.org
thumbnail

The vulnerability could allow attackers to take advantage of an information leak to steal sensitive details like private messages, passwords, and encryption keys.

wired EN 2023 Downfall chips intel processors Vulnerability
Analysis: MOVEit hack spawned over 600 breaches but is not done yet -cyber analysts | Reuters https://www.reuters.com/technology/moveit-hack-spawned-around-600-breaches-isnt-done-yet-cyber-analysts-2023-08-08/
13/08/2023 21:16:00
QRCode
archive.org
thumbnail

A hydra-headed breach centered on a single American software maker has compromised data at more than 600 organizations worldwide, according to cyber analyst tallies corroborated by Reuters.

reuters EN 2023 MOVEit breaches
Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software | The White House https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/09/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software/
13/08/2023 21:14:12
QRCode
archive.org
thumbnail

Several leading AI companies – Anthropic, Google, Microsoft, and OpenAI – to partner with DARPA in major competition to make software more secure The Biden-Harris Administration today launched a major two-year competition that will use artificial intelligence (AI) to protect the United States’ most important software, such as code that helps run the internet and…

whitehouse EN 2023 AI Cyber-Challenge US DARPA Biden-Harris
Cyber-attack on UK's electoral registers revealed https://www.bbc.com/news/uk-politics-66441010
13/08/2023 18:32:39
QRCode
archive.org
thumbnail

The Electoral Commission warns the public to be vigilant for unauthorised use of their personal data.

bbc EN 2023 Electoral Commission UK leak register vote
5 arrested in Poland for running bulletproof hosting service for cybercrime gangs | Europol https://www.europol.europa.eu/media-press/newsroom/news/5-arrested-in-poland-for-running-bulletproof-hosting-service-for-cybercrime-gangs
13/08/2023 17:15:19
QRCode
archive.org
thumbnail

Five of its administrators were arrested, and all of its servers seized, rendering LolekHosted.net no longer available.  This latest success in the fight against cybercrime follows a complex investigation supported by Europol and the US Federal Bureau of Investigation (FBI).  Criminal hideouts for lease Bulletproof hosting is a service in which an online infrastructure is offered, and operators will generally...

europol EN 2023 LolekHosted arrested FBI Poland
Microsoft’s Role in Email Breach by Suspected Chinese Hackers Part of US Inquiry https://archive.ph/uRC0G
12/08/2023 19:27:13
QRCode
archive.org
thumbnail

A US cybersecurity advisory panel will investigate risks in cloud computing, including Microsoft Corp.’s role in a recent breach of government officials’ email accounts by suspected Chinese hackers, according to two people familiar with the matter.
The Cyber Safety Review Board, which was created by the Biden administration to investigate major cybersecurity events, will focus on risks to cloud computing infrastructure broadly, including identity and authentication management, and will examine all relevant cloud service providers, according to a Department of Homeland Security official. The issue was brought into focus by the breach of Microsoft’s email systems, the official said. Both people asked not to be named so they could discuss sensitive information.

Bloomberg EN 2023 Microsoft cloud investigate US Email Breach Inquiry
MoustachedBouncer: Espionage against foreign diplomats in Belarus https://www.welivesecurity.com/en/eset-research/moustachedbouncer-espionage-against-foreign-diplomats-in-belarus/
11/08/2023 08:28:57
QRCode
archive.org

MoustachedBouncer is a cyberespionage group discovered by ESET Research and first publicly disclosed in this blogpost. The group has been active since at least 2014 and only targets foreign embassies in Belarus. Since 2020, MoustachedBouncer has most likely been able to perform adversary-in-the-middle (AitM) attacks at the ISP level, within Belarus, in order to compromise its targets. The group uses two separate toolsets that we have named NightClub and Disco.

welivesecurity EN 2023 MoustachedBouncer cyberespionage AitM Belarus
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
10/08/2023 10:11:12
QRCode
archive.org
thumbnail
  • We analyzed Tencent’s Sogou Input Method, which, with over 450 million monthly active users, is the most popular Chinese input method in China.
  • Analyzing the Windows, Android, and iOS versions of the software, we discovered troubling vulnerabilities in Sogou Input Method’s custom-designed “EncryptWall” encryption system and in how it encrypts sensitive data.
  • We found that network transmissions containing sensitive data such as those containing users’ keystrokes are decipherable by a network eavesdropper, revealing what users are typing as they type.
  • We disclosed these vulnerabilities to Sogou developers, who released fixed versions of the affected software as of July 20, 2023 (Windows version 13.7, Android version 11.26, and iOS version 11.25).
  • These findings underscore the importance for software developers in China to use well-supported encryption implementations such as TLS instead of attempting to custom design their own.
citizenlab EN 2023 Sogou Keyboard encryption eavesdropping
Researchers watched 100 hours of hackers hacking honeypot computers https://techcrunch.com/2023/08/09/researchers-watched-100-hours-of-hackers-hacking-honeypot-computers/
10/08/2023 10:04:24
QRCode
archive.org
thumbnail

Imagine being able to sit behind a hacker and observe them take control of a computer and play around with it.

That’s pretty much what two security researchers did thanks to a large network of computers set up as a honeypot for hackers.

The researchers deployed several Windows servers deliberately exposed on the internet, set up with Remote Desktop Protocol, or RDP, meaning that hackers could remotely control the compromised servers as if they were regular users, being able to type and click around.

techcrunch EN 2023 honeypots hackers hacking researchers research honeypot
Interpol takes down 16shop phishing-as-a-service platform https://www.bleepingcomputer.com/news/security/interpol-takes-down-16shop-phishing-as-a-service-platform/
10/08/2023 10:02:02
QRCode
archive.org
thumbnail

A joint operation between Interpol and cybersecurity firms has led to an arrest and shutdown of the notorious 16shop phishing-as-a-service (PhaaS) platform.

bleepingcomputer EN 2023 16shop phishing-as-a-service PhaaS interpol down
Nearly every AMD CPU since 2017 vulnerable to Inception bug https://www.theregister.com/2023/08/09/amd_inception/
10/08/2023 09:59:43
QRCode
archive.org
thumbnail

AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running vulnerable machine.

theregister EN 2023 CVE-2023-20569 AMD CPU processor bug Inception
page 143 / 213
4831 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn