Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 155 / 207
4137 résultats taggé EN  ✕
Apple fixes two zero-days exploited to hack iPhones and Macs https://www.bleepingcomputer.com/news/apple/apple-fixes-two-zero-days-exploited-to-hack-iphones-and-macs/
07/04/2023 20:29:05
QRCode
archive.org
thumbnail

Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads.

Apple EN 2023 updates zero-day vulnerabilities ios macos
Stopping cybercriminals from abusing security tools https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/
06/04/2023 23:57:40
QRCode
archive.org
thumbnail

Microsoft’s Digital Crimes Unit (DCU), cybersecurity software company Fortra™ and Health Information Sharing and Analysis Center (Health-ISAC) are taking technical and legal action to disrupt cracked, legacy copies of Cobalt Strike and abused Microsoft software, which have been used by cybercriminals to distribute malware, including ransomware. This is a change in the way DCU has...

microsoft EN 2023 CobaltStrike Fortra ISAC security tools abusing statement
Resecurity uncovers STYX, new cybercriminal platform focused on financial fraud - Help Net Security https://www.helpnetsecurity.com/2023/04/06/resecurity-uncovers-styx-cybercriminal-platform/
06/04/2023 08:32:32
QRCode
archive.org
thumbnail

Resecurity has recently identified the STYX Innovation Marketplace, a new cybercriminal e-commerce platform focused on financial fraud.

helpnetsecurity 2023 EN STYX Marketplace financial fraud cybercriminal e-commerce
Mac Malware MacStealer Spreads as Fake P2E Apps https://www.trendmicro.com/en_us/research/23/c/mac-malware-macstealer-spreads-as-fake-p2-e-apps.html
05/04/2023 21:03:16
QRCode
archive.org
thumbnail

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

trendmicro EN 2023 MacStealer malware macos report Telegram Twitter P2E Mac
Troy Hunt: Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster" https://www.troyhunt.com/seized-genesis-market-data-is-now-searchable-in-have-i-been-pwned-courtesy-of-the-fbi-and-operation-cookie-monster/
05/04/2023 14:05:30
QRCode
archive.org
thumbnail

A quick summary first before the details: This week, the FBI in cooperation with international law enforcement partners took down a notorious marketplace trading in stolen identity data in an effort they've named "Operation Cookie Monster". They've provided millions of impacted email addresses and passwords to Have I Been Pwned

troyhunt EN 2023 Seized Genesis Market Data FBI HaveIBeenPowned
Rilide: A New Malicious Browser Extension for Stealing Cryptocurrencies https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rilide-a-new-malicious-browser-extension-for-stealing-cryptocurrencies/
05/04/2023 08:59:27
QRCode
archive.org
thumbnail

Trustwave SpiderLabs uncovered a new strain of malware that it dubbed Rilide, which targets Chromium-based browsers such as Google Chrome, Microsoft Edge, Brave, and Opera.

trustwave c2023 EN Cryptocurrencies Rilide Stealer-Extension Chromium-based Browser RAT Ekipa Extension
Chinese fraudsters: evading detection and monetizing stolen credit card information https://cybersecurity.att.com/blogs/security-essentials/chinese-fraudsters-evading-detection-and-monetizing-stolen-credit-card-information
05/04/2023 08:46:10
QRCode
archive.org
thumbnail

Cyber attacks are common occurrences that often make headlines, but the leakage of personal information, particularly credit card data, can have severe consequences for individuals. It is essential to understand the techniques employed by cyber criminals to steal this sensitive information.

Credit card fraud in the United States has been on the rise, with total losses reaching approximately $12.16 billion in 2021, according to Insider Intelligence. Card-Not-Present (CNP) fraud constituted 72% of these losses, with a substantial portion attributed to Chinese fraudsters.

ATT EN 2023 Chinese fraud creditcard fraudsters Card-Not-Present
Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service https://medium.com/checkmarx-security/who-broke-npm-malicious-packages-flood-leading-to-denial-of-service-77ac707ddbf1
05/04/2023 08:42:35
QRCode
archive.org
thumbnail

We’ve seen spam campaigns in the open-source ecosystems in the past year, but this month was by far the worst one we’ve seen yet. Apparently, attackers found the unvetted open-source ecosystems as an…

checkmarx-security EN 2023 NPM spam campaign flood DoS scam medium
Responsible Cyber Power in Practice https://www.gov.uk/government/publications/responsible-cyber-power-in-practice/responsible-cyber-power-in-practice-html
05/04/2023 08:30:22
QRCode
archive.org

The vision of the UK’s National Cyber Strategy (NCS) 2022 is that the UK will continue to be a leading, responsible and democratic cyber power, able to protect and promote its interests in and through cyberspace in support of national goals. The NCS 2022 set out how the UK will continue to adapt, innovate, and invest in order to pioneer a cyber future with the whole of the UK.

UK gov.uk 2023 EN Responsible CyberPower Guidance vision
National Cyber Force reveals how daily cyber operations protect the UK https://www.gov.uk/government/news/national-cyber-force-reveals-how-daily-cyber-operations-protect-the-uk
05/04/2023 08:23:36
QRCode
archive.org
thumbnail

The NCF outlines how it conducts responsible cyber operations to counter state threats, support military operations, and disrupt terrorists and serious crime

UK uk.gov 2023 EN National Cyber Force NCF press-release cyberoperations
Winter Vivern | Uncovering a Wave of Global Espionage https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/
05/04/2023 08:19:24
QRCode
archive.org
thumbnail

SentinelLabs uncover a previously unknown set of espionage campaigns conducted by Winter Vivern advanced persistent threat (APT) group.

sentinelone EN 2023 APT WinterVivern anallysis Russia
Rorschach – A New Sophisticated and Fast Ransomware https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/
04/04/2023 14:31:31
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) encountered a previously unnamed ransomware strain, we dubbed Rorschach, deployed against a US-based company.
    Rorschach ransomware appears to be unique, sharing no overlaps that could easily attribute it to any known ransomware strain. In addition, it does not bear any kind of branding which is a common practice among ransomware groups.
  • The ransomware is partly autonomous, carrying out tasks that are usually manually performed during enterprise-wide ransomware deployment, such as creating a domain group policy (GPO). In the past, similar functionality was linked to LockBit 2.0.
  • The ransomware is highly customizable and contains technically unique features, such as the use of direct syscalls, rarely observed in ransomware. Moreover, due to different implementation methods, Rorschach is one of the fastest ransomware observed, by the speed of encryption.
  • The ransomware was deployed using DLL side-loading of a Cortex XDR Dump Service Tool, a signed commercial security product, a loading method which is not commonly used to load ransomware. The vulnerability was properly reported to Palo Alto Networks.
checkpoint research EN 2023 Rorschach ransomware DLL side-loading Cortex XDR
3CX Desktop App Compromised (CVE-2023-29059) https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
04/04/2023 08:17:12
QRCode
archive.org
thumbnail

FortiGuard Labs highlights how a digitally signed 3CX desktop app was reportedly used in a supply chain attack against 3CX Voice over Internet Protocol (VoIP) customers. Check back for analysis and coverage updates.

fortinet EN 2023 3CX FortiGuard-Lab supply-chain Threat-Research CVE-2023-29059 analysis
Android app from China executed 0-day exploit on millions of devices | Ars Technica https://arstechnica.com/information-technology/2023/03/android-app-from-china-executed-0-day-exploit-on-millions-of-devices/
03/04/2023 18:11:01
QRCode
archive.org
thumbnail

Fast-growing e-commerce app Pinduoduo had an EvilParcel stow-away.

arstechnica EN 2023 Pinduoduo EvilParcel 0-day exploit
Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide https://blog.cyble.com/2023/04/03/cl0p-ransomware-active-threat-plaguing-businesses-worldwide/
03/04/2023 16:32:20
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs analyzes Cl0p ransomware which is rapidly gaining attention for its success in extorting businesses.

cyble EN 2023 Cl0p ransomware analysis
Western Digital discloses network breach, My Cloud service down https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/
03/04/2023 12:41:34
QRCode
archive.org
thumbnail

Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems.

The California-based computer drive maker and provider of data storage services says in a press release that the network security incident was identified last Sunday, on March 26.

An investigation is in early stages and the company is coordinating efforts with law enforcement authorities.

bleepingcomputer EN 2023 WD WesternDigital breached breach
New Money Message ransomware demands million dollar ransoms https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
03/04/2023 12:08:34
QRCode
archive.org
thumbnail

A new ransomware gang named 'Money Message' has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor.

bleepingcomputer EN 2023 Data-Theft Double-Extortion Encryption Money-Message Ransomware
Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html
03/04/2023 12:03:00
QRCode
archive.org
thumbnail

While many apps collect vast troves of user data, sometimes without explicit consent, experts say Chinese e-commerce giant Pinduoduo has taken violations of privacy and data security to the next level.

cnn EN 2023 Pinduoduo China US privacy spy
Analysis of In-the-wild Attack Samples Exploiting Outlook Privilege Escalation Vulnerability https://ti.qianxin.com/blog/articles/Analysis-of-In-the-wild-Attack-Samples-Exploiting-Outlook-Privilege-Escalation-Vulnerability-(CVE-2023-23397)-EN/
03/04/2023 07:19:20
QRCode
archive.org

QiAnXin Threat Intelligence Center's RedDrip team tracked the relevant events and discovered a batch of attack samples exploiting the CVE-2023-23397 vulnerability. After analyzing these samples and C2 servers, we believe that the exploitation of this vulnerability in the wild has been ongoing since March 2022. In the later stages of the attack, the attackers used Ubiquiti-EdgeRouter routers as C2 servers, and the victims of the attack activity were from multiple countries.

qianxin EN 2023 qianxin CVE-2023-23397 Ubiquiti-EdgeRouter analysis
Meet the FSB contractor: 0Day Technologies https://clement-briens.com/2023/04/01/meet-the-fsb-contractor-0day-technologies/
03/04/2023 07:18:41
QRCode
archive.org
thumbnail

An investigation into the FSB’s digital surveillance and disinformation contractor

clement-briens EN 2023 FSB Russia investigation disinformation contractor
page 155 / 207
4723 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio