Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 159 / 207
4137 résultats taggé EN  ✕
Who’s Behind the NetWire Remote Access Trojan? https://krebsonsecurity.com/2023/03/whos-behind-the-netwire-remote-access-trojan/
10/03/2023 22:54:28
QRCode
archive.org

A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords. The arrest coincided with a seizure of…

krebsonsecurity EN 2023 Croatian RAT NetWire arrested
Telehealth startup Cerebral shared millions of patients' data with advertisers https://techcrunch.com/2023/03/10/cerebral-shared-millions-patient-data-advertisers/
10/03/2023 16:48:12
QRCode
archive.org
thumbnail

The startup shared millions of patients' personal information and health data with Google, Facebook, and TikTok.

techcrunch EN 2023 cerebral telehealth leak privacy PII
Netcat Attack Cases Targeting MS-SQL Servers (LOLBins) https://malware.news/t/netcat-attack-cases-targeting-ms-sql-servers-lolbins/67806
10/03/2023 08:48:44
QRCode
archive.org
thumbnail

ASEC (AhnLab Security Emergency response Center) has recently discovered the distribution of the Netcat malware targeting poorly managed MS-SQL servers. Netcat is a utility that allows users to send and receive data from…

malware.news EN 2023 ASEC MS-SQL servers Netcat LOLBins
Israeli Firm Suspected of Illegally Selling Classified Spy Tech https://www.haaretz.com/israel-news/security-aviation/2023-03-08/ty-article/.premium/israel-firm-nfv-systems-illegally-selling-classified-spy-tech/00000186-bceb-d2e9-a7df-bdef014c0000
09/03/2023 22:19:19
QRCode
archive.org

Haaretz reveals NFV Systems’ surveillance tools; firm under investigation by secretive Israeli body for skirting arms export controls, in case that may ‘damage national security’

haaretz EN 2023 NFV Israel Spy spyware paywall
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft https://sysdig.com/blog/cloud-breach-terraform-data-theft/
09/03/2023 18:42:29
QRCode
archive.org
thumbnail

The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL.

sysdig EN 2023 SCARLETEEL cloud Kubernetes Terraform AWS Data-Theft
Gang leaks Lehigh Valley Health Network cancer patient photos as part of data hack https://www.lehighvalleylive.com/business/2023/03/gang-leaks-lehigh-valley-health-network-cancer-patient-photos-as-part-of-data-hack.html
08/03/2023 22:30:34
QRCode
archive.org
thumbnail

A ransomware gang has posted photos of Lehigh Valley Health Network cancer patients on the dark web after the health network refused to pay a ransom last month following a cyberattack.

lehighvalleylive EN 2023 Health patient hospital photos ransomware gang ALPHV BlackCat
New HiatusRAT router malware covertly spies on victims - Lumen https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/
08/03/2023 21:38:44
QRCode
archive.org
thumbnail

Lumen Black Lotus Labs identified a new campaign involving compromised routers. HiatusRAT allows threat actors to remotely interact with the system.

lumen EN 2023 routers HiatusRAT
A Noteworthy Threat: How Cybercriminals are Abusing OneNote https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/a-noteworthy-threat-how-cybercriminals-are-abusing-onenote-part-1/
08/03/2023 21:34:33
QRCode
archive.org
thumbnail

Threat actors are taking advantage of Microsoft OneNote's ability to embed files and use social engineering techniques, such as phishing emails and lures inside the OneNote document, to get unsuspecting users to download and open malicious files.

trustwave EN 2023 Microsoft OneNote phishing malicious analysis
CVE-2023-27532 https://www.veeam.com/kb4424?s=09
08/03/2023 19:14:41
QRCode
archive.org
thumbnail

Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.

veeam EN 2023 advisory vulnerability Backup
Acer Breached, Hacker Selling Access to 160GB of Stolen Data https://www.pcmag.com/news/acer-breached-hacker-selling-access-to-160gb-of-stolen-data
08/03/2023 10:35:34
QRCode
archive.org
thumbnail

The hacker claims the stolen data includes confidential presentations from Acer, along with software files for the company's PC products. Acer says consumer data was not breached.

pcmag EN 2023 Acer leak Stolen Data confidential presentations
Sony's Legal Attack on Quad9, Censorship, and Freedom of Speech https://quad9.net/news/blog/sony-s-legal-attack-on-quad9-censorship-and-freedom-of-speech/
08/03/2023 10:30:09
QRCode
archive.org

A potentially precedent-setting legal case involving Sony Music and Quad9 may endanger internet freedom of speech and allow unchecked content censorship.

quad9 EN 2023 Sony censorship public-dns dns privacy security Censorship legal Freedom
Meta’s LLaMA Leaked to the Public, Thanks To 4chan https://analyticsindiamag.com/metas-llama-leaked-to-the-public-thanks-to-4chan/
08/03/2023 10:27:40
QRCode
archive.org
thumbnail

LLaMA, Meta’s latest family of large language models, has been leaked along with its weights and is now available to download through torrents

analyticsindiamag EN 2023 4chan LLaMA leak Meta AI torrents
Sudoedit can edit arbitrary files https://www.sudo.ws/security/advisories/sudoedit_any/
07/03/2023 10:23:35
QRCode
archive.org

A flaw in exists in sudo’s -e option (aka sudoedit) that allows a malicious user with sudoedit privileges to edit arbitrary files.
Sudo versions affected: Sudo versions 1.8.0 through 1.9.12p1 inclusive are affected. Versions of sudo prior to 1.8.0 construct the argument vector differently and are not affected.
CVE ID: This vulnerability has been assigned CVE-2023-22809 in the Common Vulnerabilities and Exposures database.
Details: When invoked as sudo -e or sudoedit, sudo can be used to edit privileged files while running the editor as an unprivileged user.

sudo EN 2023 Sudoedit arbitrary CVE-2023-22809
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716) https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
07/03/2023 08:28:32
QRCode
archive.org
thumbnail

A PoC exploit for CVE-2023-21716, a critical RCE vulnerability in Microsoft Word that can be exploited when the user previews a specially crafted RTF document, is now publicly available.

helpnetsecurity EN 2023 PoC CVE-2023-21716 RCE vulnerability
Germany and Ukraine hit two high-value ransomware targets https://www.europol.europa.eu/media-press/newsroom/news/germany-and-ukraine-hit-two-high-value-ransomware-targets?mtm_campaign=newsletter
06/03/2023 19:28:27
QRCode
archive.org
thumbnail

This ransomware appeared in 2019, when cybercriminals started using it to launch attacks against organisations and critical infrastructure and industries. Based on the BitPaymer ransomware and part of the Dridex malware family, DoppelPaymer used a unique tool capable of compromising defence mechanisms by terminating the security-related process of the attacked systems. The DoppelPaymer attacks were enabled by the prolific EMOTET...

europol EN 2023 DoppelPaymer ransomware BitPaymer Dridex raid J-CAT
We Found 28,000 Apps Sending Data to TikTok. A Ban Won't Help. https://gizmodo.com/tiktok-ban-joe-biden-28000-apps-sdk-data-china-1850174019
05/03/2023 12:06:06
QRCode
archive.org
thumbnail

TikTok’s software development kits could undermine Joe Biden's order to stop internet traffic flowing from federal employees' phones to TikTok within 30 days.

gizmodo en 2023 TikTok ban data China advertising
PyPi Packages Deliver Python Remote Access Tools https://www.kroll.com/en/insights/publications/cyber/pypi-packages-deliver-python-remote-access-tools
03/03/2023 16:01:02
QRCode
archive.org
thumbnail

While researching initial attack vectors, the Kroll Cyber Threat Intelligence team identified a fully featured information stealer and remote access tool in the python package index that could lead to an intensified threat landscape. Read more.

kroll EN 2023 pypi-packages pypi-malware python-remote-access-tool supplychain
Credit Suisse breach spills info of high-net-worth clients https://nypost.com/2023/03/02/credit-suisse-breach-spills-info-of-high-net-worth-clients/
03/03/2023 08:56:30
QRCode
archive.org
thumbnail

Credit Suisse is telling its clients that sensitive personal information including social security identification and contact details has been compromised.

nypost 2023 EN Business banks credit-suisse hacking leak VIP PII
Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity https://www.wsj.com/articles/biden-national-cyber-strategy-seeks-to-hold-software-firms-liable-for-insecurity-67c592d6?mod=panda_wsj_author_alert
03/03/2023 08:52:23
QRCode
archive.org
thumbnail

Markets have imposed “inadequate costs” on companies that build vulnerable technology, it says.

wsj EN 2023 National strategy US Biden Software Liable liability Insecurity
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/
03/03/2023 08:36:52
QRCode
archive.org
thumbnail

Read the full strategy here Today, the Biden-Harris Administration released the National Cybersecurity Strategy to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this decisive decade, the United States will reimagine cyberspace as a tool to achieve our goals in a way that reflects our values: economic security…

PDF document

whitehouse EN 2023 statement National Cybersecurity Strategy US
page 159 / 207
4723 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio