Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 152 / 207
4136 résultats taggé EN  ✕
Mirai Botnet Attackers Exploit TP-Link Router Bug https://duo.com/decipher/mirai-botnet-attackers-exploit-tp-link-bug
26/04/2023 21:43:45
QRCode
archive.org
thumbnail

Researchers began to detect exploit attempts in the wild targeting the patched, high-severity flaw in TP-Link routers starting on April 11.

duo decipher EN 2023 Mirai Exploit TP-Link CVE-2023-1389
Attackers Use Containers for Profit via TrafficStealer https://www.trendmicro.com/en_us/research/23/d/attackers-use-containers-for-profit-via-trafficstealer.html
26/04/2023 21:29:42
QRCode
archive.org
thumbnail

We found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.

trendmicro EN 2023 cloud report Containers TrafficStealer docker
Cyble — Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram https://blog.cyble.com/2023/04/26/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram/
26/04/2023 15:07:55
QRCode
archive.org
thumbnail

CRIL analyzes AMOS, a stealthy new information stealer targeting macOS and disseminating stolen information via Telegram.

cyble EN 2023 AMOS macOS stealer Telegram Golang AMOS MacStealer
VMware Patches Critical Vulnerability Disclosed at Pwn2Own Hacking Contest https://www.securityweek.com/vmware-patches-critical-vulnerability-disclosed-at-pwn2own-hacking-contest/
26/04/2023 11:27:38
QRCode
archive.org
thumbnail

VMware this week released patches for a critical vulnerability disclosed at the Pwn2Own Vancouver 2023 hacking contest.

securityweek EN 2023 VMware critical vulnerability Pwn2Own CVE-2023-20869
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users https://www.esentire.com/web-native-pages/gootloader-unloaded
26/04/2023 09:11:35
QRCode
archive.org

eSentire’s Threat Response Unit (TRU), led by researchers Joe Stewart and Keegan Keplinger, have launched a multi-pronged offensive against a growing cyberthreat: the Gootloader Initial Access-as-a-Service Operation. The Gootloader Operation is an expansive cybercrime business, and it has been active since 2018. For the past 15 months, the Gootloader Operator has been launching ongoing attacks targeting legal professionals working for both law firms and corporate legal departments in the U.S., Canada, the U.K. and Australia. Between January and March 2023, TRU shut down Gootloader attacks against 12 different organizations, seven of which were law firms.

esentire EN 2023 Gootloader Access-as-a-Service Offensive hackback
New high-severity vulnerability (CVE-2023-29552) discovered in the Service Location Protocol (SLP) https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp
26/04/2023 08:58:02
QRCode
archive.org

Researchers from Bitsight and Curesec have jointly discovered a high-severity vulnerability — tracked as CVE-2023-29552 — in the Service Location Protocol (SLP)

bitsight EN 2023 CVE-2023-29552 SLP DoS Amplification
Smartphones With Popular Qualcomm Chip Secretly Share Private Information With US Chip-Maker https://www.nitrokey.com/news/2023/smartphones-popular-qualcomm-chip-secretly-share-private-information-us-chip-maker
25/04/2023 22:43:43
QRCode
archive.org
thumbnail

During our security research we found that smart phones with Qualcomm chip secretly send personal data to Qualcomm. This data is sent without user consent, unencrypted, and even when using a Google-free Android distribution. This is possible because the Qualcomm chipset itself sends the data, circumventing any potential Android operating system setting and protection mechanisms. Affected smart phones are Sony Xperia XA2 and likely the Fairphone and many more Android phones which use popular Qualcomm chips.

nitrokey EN 2023 privacy Qualcomm Chip Secretly Share
PSA: upgrade your LUKS key derivation function https://mjg59.dreamwidth.org/66429.html
23/04/2023 11:23:25
QRCode
archive.org

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

mjg59 EN Linux LUKS KDF cracked police encryption password AES
Meet the hacker armies on Ukraine's cyber front line https://www.bbc.com/news/technology-65250356
23/04/2023 00:35:55
QRCode
archive.org
thumbnail

How links between ‘hacktivists’ and official military are becoming blurred on both sides in the war.

bbc EN 2023 hacktivists military Ukraine cyberarmy vigilante Telegram russia-ukraine-war
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) https://vulncheck.com/blog/cve-2023-1671-analysis
22/04/2023 20:04:20
QRCode
archive.org
thumbnail

CVE-2023-1671 is a pre-authenticated command injection in Sophos Web Appliance. In this blog post, VulnCheck researchers analyze the vulnerability and develop a proof of concept (PoC) for it.

vulncheck EN 2023 analysis vulnerability Sophos CVE-2023-1671 pre-authenticated command injection
Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack https://zetter.substack.com/p/software-maker-3cx-was-compromised
22/04/2023 17:28:04
QRCode
archive.org
thumbnail

Hackers first compromised a different software maker and embedded malware in one of its programs. 3CX got compromised when a worker downloaded that program. It's not known why worker downloaded it.

zetter EN 2023 3CX Supply-Chain-Attack
World's largest cyber defense exercise Locked Shields brings together over 3000 participants https://ccdcoe.org/news/2023/6016/
22/04/2023 09:29:53
QRCode
archive.org

Tallinn, Estonia – From 18 to 21 April, the NATO Cooperative Cyber Defense Center of Excellence (CCDCOE) is hosting Locked Shields 2023, the world’s largest live-fire cyber defense exercise. Over 3,000 participants from 38 nations are taking part in the exercise, which involves protecting real computer systems from real-time attacks and simulating tactical and strategic decisions in critical situations.

ccdcoe EN 2023 NATO Cooperative CyberDefense exercise
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
21/04/2023 23:25:08
QRCode
archive.org
thumbnail

North Korean-linked operation affected more organizations beyond 3CX, including two critical infrastructure organizations in the energy sector.

symantec EN 2023 North North-Korea 3CX X_Trader Supply-Chain-Attack
Critical Vulnerabilities in PaperCut Print Management Software https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
21/04/2023 23:00:09
QRCode
archive.org

Our team is tracking in-the-wild exploitation of zero-day vulnerabilities against PaperCut MF/NG which allow for unauthenticated remote code execution due to an authentication bypass.

huntress EN 2023 PaperCut zero-day RCE Print Management Software
'RustBucket' malware targets macOS https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
21/04/2023 17:30:05
QRCode
archive.org
thumbnail

Learn how APT group, BlueNoroff, targets Apple with malware variant to compromise macOS devices.

jamf EN 2023 macOS BlueNoroff RustBucket malware analysis
3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/
21/04/2023 08:44:36
QRCode
archive.org

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts…

krebsonsecurity EN 2023 3CX Double Supply-Chain-Attack North North-Korea
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
21/04/2023 08:43:29
QRCode
archive.org
thumbnail

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.

welivesecurity EN 2023 3CX Lazarus Operation DreamJob
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
20/04/2023 14:04:45
QRCode
archive.org
thumbnail

A software supply chain attack led to another software supply chain attack.

mandiant EN 2023 3CX analysis Supply-Chain-Attack
Threat Actors Rapidly Adopt Web3 IPFS Technology https://unit42.paloaltonetworks.com/ipfs-used-maliciously/
19/04/2023 23:00:08
QRCode
archive.org
thumbnail

Web3 technologies are seeing widespread adoption — including by TAs. We discuss Web3 technology InterPlanetary File System (IPFS), and malicious use of it.

unit42 EN 2023 paloalto IPFS malicious use Web3
‘AuKill’ EDR killer malware abuses Process Explorer driver https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver/
19/04/2023 20:16:14
QRCode
archive.org
thumbnail

Driver based attacks against security products are on the rise

sophos EN 2023 Procexp.sys aukill EDR
page 152 / 207
4722 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio