Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 158 / 213
4250 résultats taggé EN  ✕
Smartphones With Popular Qualcomm Chip Secretly Share Private Information With US Chip-Maker https://www.nitrokey.com/news/2023/smartphones-popular-qualcomm-chip-secretly-share-private-information-us-chip-maker
25/04/2023 22:43:43
QRCode
archive.org
thumbnail

During our security research we found that smart phones with Qualcomm chip secretly send personal data to Qualcomm. This data is sent without user consent, unencrypted, and even when using a Google-free Android distribution. This is possible because the Qualcomm chipset itself sends the data, circumventing any potential Android operating system setting and protection mechanisms. Affected smart phones are Sony Xperia XA2 and likely the Fairphone and many more Android phones which use popular Qualcomm chips.

nitrokey EN 2023 privacy Qualcomm Chip Secretly Share
PSA: upgrade your LUKS key derivation function https://mjg59.dreamwidth.org/66429.html
23/04/2023 11:23:25
QRCode
archive.org

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

mjg59 EN Linux LUKS KDF cracked police encryption password AES
Meet the hacker armies on Ukraine's cyber front line https://www.bbc.com/news/technology-65250356
23/04/2023 00:35:55
QRCode
archive.org
thumbnail

How links between ‘hacktivists’ and official military are becoming blurred on both sides in the war.

bbc EN 2023 hacktivists military Ukraine cyberarmy vigilante Telegram russia-ukraine-war
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) https://vulncheck.com/blog/cve-2023-1671-analysis
22/04/2023 20:04:20
QRCode
archive.org
thumbnail

CVE-2023-1671 is a pre-authenticated command injection in Sophos Web Appliance. In this blog post, VulnCheck researchers analyze the vulnerability and develop a proof of concept (PoC) for it.

vulncheck EN 2023 analysis vulnerability Sophos CVE-2023-1671 pre-authenticated command injection
Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack https://zetter.substack.com/p/software-maker-3cx-was-compromised
22/04/2023 17:28:04
QRCode
archive.org
thumbnail

Hackers first compromised a different software maker and embedded malware in one of its programs. 3CX got compromised when a worker downloaded that program. It's not known why worker downloaded it.

zetter EN 2023 3CX Supply-Chain-Attack
World's largest cyber defense exercise Locked Shields brings together over 3000 participants https://ccdcoe.org/news/2023/6016/
22/04/2023 09:29:53
QRCode
archive.org

Tallinn, Estonia – From 18 to 21 April, the NATO Cooperative Cyber Defense Center of Excellence (CCDCOE) is hosting Locked Shields 2023, the world’s largest live-fire cyber defense exercise. Over 3,000 participants from 38 nations are taking part in the exercise, which involves protecting real computer systems from real-time attacks and simulating tactical and strategic decisions in critical situations.

ccdcoe EN 2023 NATO Cooperative CyberDefense exercise
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
21/04/2023 23:25:08
QRCode
archive.org
thumbnail

North Korean-linked operation affected more organizations beyond 3CX, including two critical infrastructure organizations in the energy sector.

symantec EN 2023 North North-Korea 3CX X_Trader Supply-Chain-Attack
Critical Vulnerabilities in PaperCut Print Management Software https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
21/04/2023 23:00:09
QRCode
archive.org

Our team is tracking in-the-wild exploitation of zero-day vulnerabilities against PaperCut MF/NG which allow for unauthenticated remote code execution due to an authentication bypass.

huntress EN 2023 PaperCut zero-day RCE Print Management Software
'RustBucket' malware targets macOS https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
21/04/2023 17:30:05
QRCode
archive.org
thumbnail

Learn how APT group, BlueNoroff, targets Apple with malware variant to compromise macOS devices.

jamf EN 2023 macOS BlueNoroff RustBucket malware analysis
3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/
21/04/2023 08:44:36
QRCode
archive.org

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts…

krebsonsecurity EN 2023 3CX Double Supply-Chain-Attack North North-Korea
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
21/04/2023 08:43:29
QRCode
archive.org
thumbnail

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.

welivesecurity EN 2023 3CX Lazarus Operation DreamJob
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
20/04/2023 14:04:45
QRCode
archive.org
thumbnail

A software supply chain attack led to another software supply chain attack.

mandiant EN 2023 3CX analysis Supply-Chain-Attack
Threat Actors Rapidly Adopt Web3 IPFS Technology https://unit42.paloaltonetworks.com/ipfs-used-maliciously/
19/04/2023 23:00:08
QRCode
archive.org
thumbnail

Web3 technologies are seeing widespread adoption — including by TAs. We discuss Web3 technology InterPlanetary File System (IPFS), and malicious use of it.

unit42 EN 2023 paloalto IPFS malicious use Web3
‘AuKill’ EDR killer malware abuses Process Explorer driver https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver/
19/04/2023 20:16:14
QRCode
archive.org
thumbnail

Driver based attacks against security products are on the rise

sophos EN 2023 Procexp.sys aukill EDR
Black Basta claims it's selling off stolen Capita data https://www.theregister.com/2023/04/18/capita_breach_gets_worse/
19/04/2023 11:41:34
QRCode
archive.org
thumbnail

No worries, outsourcer only handles government tech contracts worth billions

theregister EN 2023 BlackBasta Capita ransomware
ntpd is not vulnerable · Issue #1 · spwpun/ntp-4.2.8p15-cves https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1
19/04/2023 11:39:34
QRCode
archive.org

The first four of these CVEs affect a function in libntp that is only used by ntpq, but not by ntpd. The last CVE affects the driver for a hardware clock (GPS receiver), so ntpd might be vulnerable...

spwpun EN 2023 libntp ntp ntpd ntp-4.2.8p15 CVE-2023-26551 CVE-2023-26552 CVE-2023-26553 CVE-2023-26554 CVE-2023-26555
in2al5d p3in4er is Almost Completely Undetectable https://blog.morphisec.com/in2al5d-p3in4er
19/04/2023 10:52:34
QRCode
archive.org
thumbnail

in2al5d p3in4er is a highly evasive new loader that has a detection ratio of 0 on VirusTotal. We explain how it works, and how to prevent it.

morphisec EN 2023 analysis malware-analysis in2al5d p3in4er Undetectable
LockBit for Mac | How Real is the Risk of macOS Ransomware? https://www.sentinelone.com/blog/lockbit-for-mac-how-real-is-the-risk-of-macos-ransomware/
19/04/2023 08:50:03
QRCode
archive.org
thumbnail

Discovery of a macOS variant of LockBit has caused alarm, but how serious a threat is it? We explore the malware and the threat of ransomware on Apple Macs.

sentinelone EN 2023 macOS LockBit analysis
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch https://techcrunch.com/2023/04/18/apple-lockdown-mode-iphone-nso-pegasus/
19/04/2023 08:42:58
QRCode
archive.org
thumbnail

Apple has fixed the three exploits used to deploy the Pegasus spyware, which did not require any interaction from the target.

techcrunch EN 2023 apple citizen-lab ios iphone malware nso nso-group spyware LockdownMode
Summary of the Investigation Related to CVE-2023-0669 https://www.fortra.com/blog/summary-investigation-related-cve-2023-0669
18/04/2023 20:35:58
QRCode
archive.org
thumbnail

We’d like to provide an update on our investigation into the suspicious activity detected in our Fortra GoAnywhere MFT solution. Working with Unit 42, we have completed our investigation and have compiled a factual summary of the investigation, as well as continuous improvement actions Fortra is taking to further strengthen our systems and recommended actions customers can take to secure their data and improve their security posture using available features in the GoAnywhere MFT solution.

Fortra EN 2023 CVE-2023-0669 investigation GoAnywhere MFT summary
page 158 / 213
4856 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn