Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 157 / 207
4137 résultats taggé EN  ✕
MacStealer: New macOS-based Stealer Malware Identified https://www.uptycs.com/blog/macstealer-command-and-control-c2-malware
27/03/2023 07:20:11
QRCode
archive.org
thumbnail

Uptycs has already identified three Windows-based malware families that use Telegram this year, including Titan Stealer, Parallax RAT, and HookSpoofer. Attackers are increasingly turning to it, particularly for stealer command and control (C2).

And now the Uptycs threat research team has discovered a macOS stealer that also controls its operations over Telegram. We’ve dubbed it MacStealer.

Uptycs EN 2023 macOS C2 stealer MacStealer Telegram
NCA infiltrates cyber crime market with disguised DDoS sites https://www.nationalcrimeagency.gov.uk/news/nca-infiltrates-cyber-crime-market-with-disguised-ddos-sites
27/03/2023 07:18:17
QRCode
archive.org
thumbnail

The National Crime Agency has today revealed that it has infiltrated the online criminal marketplace by setting up a number of sites purporting to offer DDoS-for-hire services.

Today’s announcement comes after the Agency chose to identify one of the sites currently being run by officers as part of a sustained programme of activity to disrupt and undermine DDoS as a criminal service.

nationalcrimeagency 2023 EN NCA DDoS
Throttling and Blocking Email from Persistently Vulnerable Exchange Servers to Exchange Online - Microsoft Community Hub https://techcommunity.microsoft.com/t5/exchange-team-blog/throttling-and-blocking-email-from-persistently-vulnerable/ba-p/3762078
27/03/2023 07:15:28
QRCode
archive.org
thumbnail

As we continue to enhance the security of our cloud, we are going to address the problem of email sent to Exchange Online from unsupported and unpatched Exchange servers. There are many risks associated with running unsupported or unpatched software, but by far the biggest risk is security. Once a version of Exchange Server is no longer supported, it no longer receives security updates; thus, any vulnerabilities discovered after support has ended don’t get fixed. There are similar risks associated with running software that is not patched for known vulnerabilities. Once a security update is released, malicious actors will reverse-engineer the update to get a better understanding of how to exploit the vulnerability on unpatched servers.

microsoft techcommunity EN 2023 announce Blocking Email Exchange unpatched
Bundesamt für Verfassungsschutz - Counter-intelligence - Joint Cyber Security Advisory https://www.verfassungsschutz.de/SharedDocs/kurzmeldungen/EN/2023/2023-03-20-joint-cyber-security-advisory.html
25/03/2023 22:08:17
QRCode
archive.org

Warning on KIMSUKY Cyber Actor's Recent Cyber Campaigns against Google's Browser and App Store Services

verfassungsschutz EN 2023 KIMSUKY Warning official NorthKorea Germany Google TTPs app
Shining Light on Dark Power: Yet Another Ransomware Gang https://www.trellix.com/en-us/about/newsroom/stories/research/shining-light-on-dark-power.html
25/03/2023 21:11:57
QRCode
archive.org
thumbnail

Another day, another ransomware gang. The Dark Power ransomware gang is new on the block, and is trying to make a name for itself. This blog dives into the specifics of the ransomware used by the gang, as well as some information regarding their victim naming and shaming website, filled with non-paying victims and stolen data.

trellix EN 2023 DarkPower ransomware gang research
Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments https://www.cisa.gov/news-events/alerts/2023/03/23/untitled-goose-tool-aids-hunt-and-incident-response-azure-azure-active-directory-and-microsoft-365
25/03/2023 11:12:42
QRCode
archive.org

Today, CISA released the Untitled Goose Tool to help network defenders detect potentially malicious activity in Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) environments. The Untitled Goose Tool offers novel authentication and data gathering methods for network defenders to use as they interrogate and analyze their Microsoft cloud services. The tool enables users to:

cisa EN 2023 tool AD Azure M365 hunting blueteam check
OK, it’s time to freak out about AI https://nonzero.substack.com/p/ok-its-time-to-freak-out-about-ai
24/03/2023 10:39:36
QRCode
archive.org
thumbnail

There are at least two kinds of catastrophe scenarios, and both are getting more plausible

nonzero EN 2023 AI opinion catastrophe plausible
New victims come forward after mass-ransomware attack https://techcrunch.com/2023/03/22/fortra-goanywhere-ransomware-attack/
23/03/2023 22:04:26
QRCode
archive.org
thumbnail

The number of victims affected by a mass-ransomware attack, caused by a bug in a popular data transfer tool used by businesses around the world, continues to grow as another organization tells TechCrunch that it was also hacked.

The City of Toronto told TechCrunch in a revised statement on March 23: “Today, the City of Toronto has confirmed that unauthorized access to City data did occur through a third party vendor. The access is limited to files that were unable to be processed through the third party secure file transfer system.”

techcrunch EN 2023 mass-ransomware attack Clop
Emotet resumes spam operations, switches to OneNote https://blog.talosintelligence.com/emotet-switches-to-onenote/
23/03/2023 21:55:34
QRCode
archive.org
thumbnail
  • Emotet resumed spamming operations on March 7, 2023, after a months-long hiatus.
  • Initially leveraging heavily padded Microsoft Word documents to attempt to evade sandbox analysis and endpoint protection, the botnets switched to distributing malicious OneNote documents on March 16.
  • Since returning, Emotet has leveraged several distinct infection chains, indicating that they are modifying their approach based on their perceived success in infecting new systems.
  • The initial emails delivered to victims are consistent with what has been observed from Emotet over the past several years.
talosintelligence EN 2023 Emotet OneNote
Prompt Injections are bad, mkay? https://greshake.github.io/
23/03/2023 16:47:51
QRCode
archive.org

Large Language Models (LLM) have made amazing progress in recent years. Most recently, they have demonstrated to answer natural language questions at a surprising performance level. In addition, by clever prompting, these models can change their behavior. In this way, these models blur the line between data and instruction. From "traditional" cybersecurity, we know that this is a problem. The importance of security boundaries between trusted and untrusted inputs for LLMs was underestimated. We show that Prompt Injection is a serious security threat that needs to be addressed as models are deployed to new use-cases and interface with more systems.

[PDF DOC] https://arxiv.org/pdf/2302.12173.pdf

greshake EN 2023 Prompt Injections prompt-injection AI
Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/
22/03/2023 21:39:20
QRCode
archive.org
thumbnail

Dive into the analysis and exploitation of a vulnerability in the Windows Ancillary Function Driver for Winsock for Local Privilege Escalation on Windows 11. More from X-Force Red experts.

securityintelligence EN 2023 PatchTuesday LPE Windows afd.sys CVE-2023-21768 exploit analysis reverseengineering
Journalist opens USB letter bomb in newsroom https://www.bbc.com/news/world-latin-america-65026522
22/03/2023 21:34:00
QRCode
archive.org
thumbnail

Ecuador's government condemns the attack after journalists nationwide are targeted.

Related:

bbc EN 2023 Ecuador USB explosive
Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users https://www.sentinelone.com/blog/session-cookies-keychains-ssh-keys-and-more-7-kinds-of-data-malware-steals-from-macos-users/
22/03/2023 21:20:20
QRCode
archive.org
thumbnail

Stealing data from Mac devices can unlock the door for both financially-motivated cybercrime and espionage. Learn how recent macOS malware does it.

sentinelone EN 2023 Apple macos Mac stealer stealing attacks
Reversing Emotet Dropping Javascript https://marcoramilli.com/2023/03/22/reversing-emotet-dropping-javascript/
22/03/2023 18:06:29
QRCode
archive.org
thumbnail

Recently (On March 18 2023 at 23:44), a new malspam campaign has been observed in the wild ( HERE ), which caused a significant amount of concern. This campaign is designed to distribute malicious emails, which contain a harmful payload that can infect a user’s system, steal sensitive information, or launch other types of attacks.

marcoramilli EN 2023 Reversing Emotet Dropping Javascript malspam
Privacy Violations Shutdown OpenAI ChatGPT and Beg Investigation https://www.flyingpenguin.com/?p=46374
22/03/2023 13:48:55
QRCode
archive.org

ChatGPT for a long time on March 20th posted a giant orange warning on top of their interface that they’re unable to load chat history.

flyingpenguin EN 2023 OpenAI ChatGPT chat history privacy
Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace https://www.mandiant.com/resources/blog/zero-days-exploited-2022
22/03/2023 08:02:20
QRCode
archive.org
thumbnail
  • Mandiant tracked 55 zero-day vulnerabilities that we judge were exploited in 2022. Although this count is lower than the record-breaking 81 zero-days exploited in 2021, it still represents almost triple the number from 2020.
  • Chinese state-sponsored cyber espionage groups exploited more zero-days than other cyber espionage actors in 2022, which is consistent with previous years.
  • We identified four zero-day vulnerabilities exploited by financially motivated threat actors. 75% of these instances appear to be linked to ransomware operations.
  • Products from Microsoft, Google, and Apple made up the majority of zero-day vulnerabilities in 2022, consistent with previous years. The most exploited product types were operating systems (OS) (19), followed by browsers (11), security, IT, and network management products (10), and mobile OS (6).
mandiant EN 2022 2023 zero-day zero-days vulnerabilities exploited review
Windows Installer EOP (CVE-2023-21800) https://blog.doyensec.com//2023/03/21/windows-installer.html
21/03/2023 16:51:18
QRCode
archive.org

This blog post describes the details and methodology of our research targeting the Windows Installer (MSI) installation technology.

doyensec doyensecurity EN 2023 vulnerability exploit CVE-2023-21800 MSI Windows
BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security? https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/
20/03/2023 20:54:34
QRCode
archive.org
thumbnail

The rise of publicly-accessible Al models like ChatGPT has produced some interesting attempts to create malware. How seriously should defenders take them?

sentinelone EN 2023 ChatGPT BlackMamba Malware Polymorphic
A Fake Project Related to the Sandbox Malspam https://iamdeadlyz.medium.com/pureland-a-fake-project-related-to-the-sandbox-malspam-13b9abe751d1#c03b
20/03/2023 20:47:35
QRCode
archive.org
thumbnail

On February 27, 2023, a “The Sandbox” employee was compromised, resulting in sending malspam which introduced them to “PureLand”. It leads to a RedLine Stealer and an unknown stealer for macOS. A…

iamdeadlyz EN 2023 medium Malspam PureLand macos Redline stealer
Meta Manager Was Hacked With Spyware and Wiretapped in Greece https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html
20/03/2023 20:22:46
QRCode
archive.org

A U.S. and Greek national who worked on Meta’s security and trust team while based in Greece was placed under a yearlong wiretap by the Greek national intelligence service and hacked with a powerful cyberespionage tool, according to documents obtained by The New York Times and officials with knowledge of the case.

nytimes EN 2023 spy cyberespionage U.S Meta Spyware Predator
page 157 / 207
4723 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio