Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 158 / 237
Spyware maker LetMeSpy shuts down after hacker deletes server data https://techcrunch.com/2023/08/05/letmespy-spyware-shuts-down-wiped-server/
07/08/2023 10:09:02
QRCode
archive.org
thumbnail

A June data breach wiped out the spyware maker's servers

techcrunch EN 2023 LetMeSpy data-breach
Don’t you (forget NLP): Prompt injection with control characters in ChatGPT https://dropbox.tech/machine-learning/prompt-injection-with-control-characters-openai-chatgpt-llm
04/08/2023 09:47:15
QRCode
archive.org
thumbnail

Like many companies, Dropbox has been experimenting with large language models (LLMs) as a potential backend for product and research initiatives. As interest in leveraging LLMs has increased in recent months, the Dropbox Security team has been advising on measures to harden internal Dropbox infrastructure for secure usage in accordance with our AI principles. In particular, we’ve been working to mitigate abuse of potential LLM-powered products and features via user-controlled input.

dropbox EN 2023 ChatGPT LLMs prompt-injection
Midnight Blizzard conducts targeted social engineering over Microsoft Teams https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/
04/08/2023 09:45:26
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats by the threat actor that Microsoft tracks as Midnight Blizzard (previously tracked as NOBELIUM).

microsoft EN 2023 research Social-engineering NOBELIUM MidnightBlizzard Teams
Tenable CEO accuses Microsoft of negligence in addressing security flaw https://cyberscoop.com/tenable-microsoft-negligence-security-flaw/
04/08/2023 09:44:17
QRCode
archive.org
thumbnail

Cybersecurity veteran Amit Yoran says Microsoft has a culture of toxic obfuscation when it comes to addressing security threats.

CyberScoop EN 2023 Amit-Yoran toxic Microsoft
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
04/08/2023 09:42:28
QRCode
archive.org
thumbnail

Rapid7 discovered a new vulnerability that allows unauthenticated attackers to access the API in unsupported versions of MobileIron Core (11.2 and below).

rapid7 EN 2023 CVE-2023-35082 MobileIron Core Unauthenticated API Access Vulnerability
Guarding the Bridge: New Attack Vectors in Azure AD Connect https://blog.sygnia.co/guarding-the-bridge-new-attack-vectors-in-azure-ad-connect
04/08/2023 09:41:15
QRCode
archive.org
thumbnail

By researching Azure AD Connect components, Sygnia was able to discover several attack vectors for extracting Connector credentials and domain users’ NT hashes, while avoiding common security solutions.

sygnia EN 2023 Azure AD Connect Attack Vectors NT hashes
Reptile Malware Targeting Linux Systems https://asec.ahnlab.com/en/55785/
04/08/2023 09:39:49
QRCode
archive.org
thumbnail

Reptile is an open-source kernel module rootkit that targets Linux systems and is publicly available on GitHub. [1] Rootkits are malware that possess the capability to conceal themselves or other malware. They primarily target files, processes, and network communications for their concealment. Reptile’s concealment capabilities include not only its own kernel module but also files, directories, file contents, processes, and network traffic. Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by offering a reverse...

ASEC EN 2023 Reptile open-source kernel module rootkit Linux
Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform https://www.tenable.com/security/research/tra-2023-25
04/08/2023 09:35:57
QRCode
archive.org

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets). Background The issue occurred as a result of insufficient access control to Azure Function hosts, which are launched as part of the creation and operation of custom connectors in Microsoft’s Power Platform (Power Apps, Power Automation).

tenable 2023 EN cross-tenant Cloud Microsoft-Power Platform
Microsoft…The Truth Is Even Worse Than You Think https://www.linkedin.com/pulse/microsoftthe-truth-even-worse-than-you-think-amit-yoran/
04/08/2023 09:35:37
QRCode
archive.org
thumbnail

Last week, Senator Ron Wyden sent a letter to the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Justice and the Federal Trade Commission (FTC) asking that they hold Microsoft accountable for a repeated pattern of negligent cybersecurity practices, which has enabled Chine

Amit-Yoran Microsoft tenable transparency Azure complaint Cloud
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch https://techcrunch.com/2023/08/03/russia-hackers-microsoft-teams-government/
03/08/2023 15:16:48
QRCode
archive.org
thumbnail

Russian state-sponsored hackers posed as technical support staff on Microsoft Teams to compromise dozens of global organizations, including government agencies.

techcrunch EN 2023 state-sponsored hackers technical-support Microsoft Teams APT29
Unpacking the Threats Within: The Hidden Dangers of .zip Domains https://decoded.avast.io/matejkrcma/unpacking-the-threats-within-the-hidden-dangers-of-zip-domains/
01/08/2023 10:38:08
QRCode
archive.org
thumbnail

Let's have a look at the threats brought by introduction of .zip TLD

avast EN 2023 TLD analysis
Into the tank with Nitrogen https://news.sophos.com/en-us/2023/07/26/into-the-tank-with-nitrogen/
31/07/2023 15:09:05
QRCode
archive.org
thumbnail

The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques

sophos analysis EN 2023 Nitrogen Malvertising initial-access
Tomcat Under Attack: Exploring Mirai Malware and Beyond https://blog.aquasec.com/tomcat-under-attack-investigating-the-mirai-malware
31/07/2023 15:02:28
QRCode
archive.org
thumbnail

Tomcat Vulnerability explore some of the techniques used by the Mirai botnet to exploit a single attack directed at one of our Apache Tomcat honeypots.

aquasec EN 2023 Tomcat Mirai botnet Apache
Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky) https://asec.ahnlab.com/en/55219/
31/07/2023 15:00:48
QRCode
archive.org
thumbnail

AhnLab Security Emergency response Center (ASEC) has confirmed the distribution of malware in the form of a batch file (*.bat). This malware is designed to download various scripts based on the anti-malware process, including AhnLab products, installed in the user’s environment. Based on the function names used by the malware and the downloaded URL parameters, it is suspected to have been distributed by the Kimsuky group.

asec.ahnlab malware analysis batch file Kimsuky Document Viewer
Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release https://www.sentinelone.com/blog/apple-crimeware-massive-rust-infostealer-campaign-aiming-for-macos-sonoma-ahead-of-public-release/
31/07/2023 14:57:55
QRCode
archive.org
thumbnail

Crimeware actors have launched an extensive campaign to target macOS users with malware disguised in multiple fake blockchain games.

sentinelone EN 2023 Apple Crimeware Rust Infostealer Campaign macOS Sonoma
GameOverlay Vulnerability Impacts 40% of Ubuntu Workloads https://www.wiz.io/blog/ubuntu-overlayfs-vulnerability
31/07/2023 11:28:09
QRCode
archive.org
thumbnail

Wiz Research discovers CVE-2023-2640 & CVE-2023-32629, 2 privilege escalation vulnerabilities in Ubuntu's OverlayFS module impacting 40% of cloud workloads.

wiz EN 2023 CVE-2023-2640 CVE-2023-32629 Ubuntu OverlayFS
TETRA Radio Code Encryption Has a Flaw: A Backdoor https://www.wired.com/story/tetra-radio-encryption-backdoor/
30/07/2023 21:08:14
QRCode
archive.org
thumbnail

A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.

wired EN 2023 TETRA encryption cipher Flaw Backdoor police
Critical Infrastructure Companies Warned to Watch for Ongoing Cyberattack https://www.wsj.com/articles/critical-infrastructure-companies-warned-to-watch-for-ongoing-cyberattack-76508d83
30/07/2023 21:06:57
QRCode
archive.org
thumbnail

Hackers exploited a ‘zero-day’ flaw in Ivanti software to breach 12 ministries in Norway
Norway’s security officials warned around 20 critical infrastructure companies, other businesses and public agencies in the country they might also be vulnerable to a cyberattack disclosed Monday that hit 12 government ministries.

wsj EN 2023 zero-day Ivanti Norway
Ivanti warns of second vulnerability used in attacks on Norway gov’t https://therecord.media/ivanti-warns-of-second-vulnerability-norway-government-attack
30/07/2023 20:32:11
QRCode
archive.org
thumbnail

A second vulnerability affecting mobile endpoint management software from IT giant Ivanti has been discovered, according to a new advisory from the company.

therecord EN 2023 vulnerability Ivanti Norway
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations https://www.nytimes.com/2023/07/29/us/politics/china-malware-us-military-bases-taiwan.html?unlocked_article_code=CkVkJfakp3B7yHRuZMfKfipsda7-6JFWx9IzckPNhqGpXUH9wkg5Hz0_zsSF30A62KF2-m4wDYexBYh0DodCduFlIafxZPGjWG05vpAGmIa0oZpXizM95tt2FRIcvdyIuUHf6zYAZ0nF6n8IMPG_SqFu37Ogo0d4EzUr2MWJN6bKtqepWBNhy1AAPIUSbtJIzYiM2Rm4NCdybRabtSuS0t5Y6z3A5XAZGkjZjswwmQvv29GWlXltV_aW_VxqHwr07m1sYKMVB-ElbCdMX2k-wyuFN9dKO5G9V8j5gyMvdeE9APxRPHnNDPFaJCmn8RxhUJkAexPnuG2rYevd0TjsYEo9gROS7h9C-cSNVNESNrk7ofb46g&smid=nytcore-ios-share&referringSource=articleShare
29/07/2023 21:30:51
QRCode
archive.org
thumbnail

American intelligence officials believe the malware could give China the power to disrupt or slow American deployments or resupply operations, including during a Chinese move against Taiwan.

nytimes EN 2023 China Malware US resupply Taiwan Military Operations cyberwarfare
page 158 / 237
4734 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio