Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 146 / 207
4136 résultats taggé EN  ✕
Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals - SecurityWeek https://www.securityweek.com/enzo-biochem-ransomware-attack-exposes-information-of-2-5m-individuals/
04/06/2023 22:38:10
QRCode
archive.org
thumbnail

Enzo Biochem says the clinical test information of roughly 2.47 million individuals was exposed in a recent ransomware attack.

securityweek EN 2023 Enzo_Biochem PHI ransomware
Bypassing SELinux with init_module https://seanpesce.blogspot.com/2023/05/bypassing-selinux-with-initmodule.html?m=1
04/06/2023 22:33:35
QRCode
archive.org

There are two Linux system calls for loading a kernel module - init_module and finit_module. By leveraging init_module, I bypassed a filesystem-based SELinux rule that prevented me from loading a kernel module through traditional means (e.g., insmod). I then disabled SELinux from kernel-space. Proof of concept code can be found on my GitHub.

seanpesce EN 2023 SELinux bypass
New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/05/30/new-macos-vulnerability-migraine-could-bypass-system-integrity-protection/
04/06/2023 22:30:35
QRCode
archive.org
thumbnail

A new vulnerability, which we refer to as “Migraine” for its involvement with macOS migration, could allow an attacker with root access to automatically bypass System Integrity Protection (SIP) in macOS and perform arbitrary operations on a device

Microsoft en 2023 research vulnerability macOS Migraine bypass SIP
‘Gravity Forms’ WordPress Plugin Found Vulnerable to PHP Object Injection https://www.bitdefender.com/blog/hotforsecurity/gravity-forms-wordpress-plugin-found-vulnerable-to-php-object-injection/
04/06/2023 14:05:54
QRCode
archive.org
thumbnail

Gravity Forms, a popular WordPress plugin, has been found vulnerable to
unauthenticated PHP Object Injection attacks.

bitdefender EN 2023 WP WordPress Plugin gravity-forms CVE-2023-28782
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft
03/06/2023 18:10:00
QRCode
archive.org
thumbnail

Analysis of a zero-day vulnerability in MOVEit Transfer, and containment and hardening guidance.

mandiant EN 2023 0-day MOVEit Transfer Vulnerability analysis
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware | Ars Technica https://arstechnica.com/information-technology/2023/06/clickless-ios-exploits-infect-kaspersky-iphones-with-never-before-seen-malware/
02/06/2023 13:27:34
QRCode
archive.org
thumbnail

"Operation Triangulation" stole mic recordings, photos, geolocation, and more.

arstechnica EN 2023 Triangulation iOS Apple kaspersky Russia spyware NSA
Ask Fitis, the Bear: Real Crooks Sign Their Malware https://krebsonsecurity.com/2023/06/ask-fitis-the-bear-real-crooks-sign-their-malware/
02/06/2023 09:34:44
QRCode
archive.org

Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with. Both of these qualities make stolen or ill-gotten code-signing certificates attractive…

krebsonsecurity EN 2023 Code-signing trust certificates Megatraffer
A Matter of Triangulation. https://eugene.kaspersky.com/2023/06/01/a-matter-of-triangulation/
02/06/2023 09:08:34
QRCode
archive.org
thumbnail

Hi all, Today we have very big and important news. Kaspersky experts have discovered an extremely complex, professionally targeted cyberattack that uses Apple’s mobile devices. The purpose of this attack is the inconspicuous introduction of spyware into the iPhones of employees of the company – both top and middle-management. The attack is carried out using

kaspersky EN 2023 iOS 0-Click Triangulation iphone spyware Apple
Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution https://www.zerodayinitiative.com/blog/2023/5/31/cve-2023-24941-microsoft-network-file-system-remote-code-execution
01/06/2023 20:18:21
QRCode
archive.org
thumbnail

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Quinton Crist, Guy Lederfein, and Lucas Miller of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in the Microsoft Network File Service (NFS). This bug was originally dis

zerodayinitiative EN 2023 NFS CVE-2023-2494 RCE analysis
Swiss real estate agency fails to put a password on its systems https://cybernews.com/security/neho-real-estate-agency-data-leak/
31/05/2023 20:02:36
QRCode
archive.org
  • A misconfiguration of Swiss real estate agency Neho’s systems exposed sensitive credentials to the public.
  • Using leaked data, threat actors could potentially breach the company’s internal systems and hijack official communication channels.
  • Real estate agencies handle sensitive data, including customers' personally identifiable information, bank account details, and other data highly valued by cybercriminals. Ensuring cybersecurity is vital.
  • Cybernews reached out to Neho and the company fixed the issue.
cybernews EN 2023 Swiss Neho real-estate agency databreach leak CH
Millions of Gigabyte Motherboards Were Sold With a Firmware Backdoor | WIRED https://www.wired.com/story/gigabyte-motherboard-firmware-backdoor/
31/05/2023 16:35:16
QRCode
archive.org
thumbnail

Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

wired EN 2023 security malware vulnerabilities hacking Gigabyte Motherboards
2023-05-31 // SITUATIONAL AWARENESS // Spyboy Defense Evasion Tool Advertised Online https://www.reddit.com/r/crowdstrike/comments/13wjrgn/20230531_situational_awareness_spyboy_defense/
31/05/2023 16:00:16
QRCode
archive.org

On May 21, 2023, an online persona named spyboy began advertising an endpoint defense evasion tool for the Windows operating system via the Russian-language forum Ramp. The author claims that the software — seen in a demonstration video as being titled “Terminator” — can bypass twenty three (23) EDR and AV controls. At time of writing, spyboy is pricing the software from $300 USD (single bypass) to $3,000 USD (all-in-one bypass).

CrowdStrike reddit EN 2023 EDR bypass XDR
EDR bypassing via memory manipulation techniques | WithSecure™ Labs https://labs.withsecure.com/publications/edr-bypassing-via-memory-manipulation-techniques
31/05/2023 14:13:59
QRCode
archive.org
thumbnail

Endpoint Detection & Response systems (EDR),
delivered by in-house teams or as part of a managed
service, are a feature of modern intrusion detection
and remediation operations. This success is a problem
for attackers, and malicious actors have worked to
find new ways to evade EDR detection capabilities.

PDF Document

withsecure EN 2023 Research Connor-Morley EDR bypass manipulation techniques
New hacking forum leaks data of 478,000 RaidForums members https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/
30/05/2023 08:48:58
QRCode
archive.org
thumbnail

A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the forum.

bleepingcomputer EN 2023 Data-Breach Database Exposed Hacking-Forum RaidForums
The professionalization of cyber crime https://www.withsecure.com/en/expertise/research-and-innovation/research/the-professionalization-of-cyber-crime
29/05/2023 15:13:15
QRCode
archive.org
thumbnail

The huge profits of ransomware have led to a rapid evolution and professionalization of the wider cyber crime industry, and the rapid growth of a supporting underground marketplace of products and service providers.

PDF doc

withsecure EN 2023 ransomware professionalization cyber-crime-industry,
You’ve been kept in the dark (web): exposing Qilin’s RaaS program https://www.group-ib.com/blog/qilin-ransomware/
29/05/2023 11:39:23
QRCode
archive.org

All you need to know about Qilin ransomware and its operations targeting critical sectors.
Group-IB’s Threat Intelligence team infiltrated the Qilin ransomware group in March 2023 and now can reveal inside information about this RaaS program. The blog provides recommendations on how to prevent Qilin’s attacks and will be useful for threat intelligence experts, threat hunters, and corporate cybersecurity teams.

group-ib EN 2023 Qilin RaaS infiltrated
Hundreds of Swiss students and teachers have data stolen https://www.swissinfo.ch/eng/sci-tech/hundreds-of-swiss-students-and-teachers-have-data-stolen/
29/05/2023 11:16:28
QRCode
archive.org

A total 761 people had sensitive personal data hacked during a cyberattack on the education department of the Swiss city of Basel.

swissinfo EN 2023 Basel education students ransomware databreach sensitive personal
ABB provides details about IT security incident https://new.abb.com/news/detail/103405/abb-provides-details-about-it-security-incident
29/05/2023 08:47:57
QRCode
archive.org
thumbnail

ABB recently became aware of an IT security incident that impacted certain ABB systems. ABB started an investigation, retained leading experts, notified certain law enforcement and data protection authorities, and implemented measures to contain and assess the incident. The incident has now been successfully contained.

ABB EN 2023 security-incident ransomware
Vulnerability in GCP CloudSQL Leads to Data Exposure https://www.dig.security/post/gcp-cloudsql-vulnerability-leads-to-internal-container-access-and-data-exposure
28/05/2023 23:21:17
QRCode
archive.org
thumbnail

The Dig research team reveals recently discovered critical vulnerability in GCP CloudSQL service that lead to internal container access and data exposure

dig.security EN 2023 cloud GCP CloudSQL leak exposure Google Cloud PII
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones https://arstechnica.com/information-technology/2023/05/hackers-can-brute-force-fingerprint-authentication-of-android-devices/
28/05/2023 14:11:44
QRCode
archive.org
thumbnail

Researchers have devised a low-cost smartphone attack that cracks the authentication fingerprint used to unlock the screen and perform other sensitive actions on a range of Android devices in as little as 45 minutes.

arstechnica EN 2023 BrutePrint low-cost smartphone attack fingerprint authentication attack
page 146 / 207
4721 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio