Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 161 / 237
It’s Raining Phish and Scams – How Cloudflare Pages.dev and Workers.dev Domains Get Abused | Trustwave https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/its-raining-phish-and-scams-how-cloudflare-pages-dev-and-workers-dev-domains-get-abused/
11/07/2023 19:02:22
QRCode
archive.org
thumbnail

As they say, when it rains, it pours. Recently, we observed more than 3,000 phishing emails containing phishing URLs abusing services at workers.dev and pages.dev domains.

trustwave EN 2023 Phish Scams Cloudflare Pages.dev Workers.dev
GTA, Uber and Nvidia Hackers: Lapsus$ Teens Face Blackmail, Fraud Charges https://archive.ph/BOmd3
11/07/2023 18:48:47
QRCode
archive.org

Two UK teenagers were accused of being key members of the notorious hacking group Lapsus$, with prosecutors alleging that the pair were involved in attacks on companies including Nvidia Corp., Rockstar Games Inc., and Uber Technologies Inc.

Bloomberg 2023 EN London UK teenagers Lapsus$ accused Blackmail Fraud Charges
Revolut’s US payment flaws allowed thieves to steal $20mn https://archive.ph/Joh4a#selection-2047.0-2051.60
10/07/2023 09:24:34
QRCode
archive.org

A flaw in Revolut’s payment system in the US allowed criminals to steal more than $20mn of its funds over several months last year before the company could close the loophole, according to multiple people with knowledge of the episode.

ft EN 2023 Revolut steal criminals loophole
The five-day job: A BlackByte ransomware intrusion case study https://www.microsoft.com/en-us/security/blog/2023/07/06/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study/
08/07/2023 11:31:41
QRCode
archive.org
thumbnail

In a recent investigation by Microsoft Incident Response of a BlackByte 2.0 ransomware attack, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.

microsoft EN 2023 BlackByte ransomware attack report
Une entreprise genevoise au cœur d’une vaste opération d’influence des Emirats arabes unis https://www.rts.ch/info/regions/geneve/14158973-une-entreprise-genevoise-au-cur-dune-vaste-operation-dinfluence-des-emirats-arabes-unis.html
07/07/2023 20:09:03
QRCode
archive.org
thumbnail

Collecte de données privées, désinformation et tentative d’influence politique: entre 2017 et au moins 2020, l’entreprise Alp Services à Genève orchestre dans le plus grand secret plusieurs actions pour le compte des Emirats arabes unis, révèlent des documents confidentiels obtenus par Mediapart, et partagés notamment avec la RTS

rts FR 2023 espionnage Qatar EAU données AlpServices Genève
Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures https://www.uptycs.com/blog/what-is-meduza-stealer-and-how-does-it-work
07/07/2023 13:55:01
QRCode
archive.org
thumbnail

Read Uptycs' analysis of the newly discovered Meduza Stealer malware targeting Windows users, revealing capabilities, potential impact & mitigation steps.

Uptycs EN 2023 meduza Stealer Windows analysis
Two spyware tied with China found hiding on the Google Play Store https://blog.pradeo.com/spyware-tied-china-found-google-play-store
07/07/2023 10:21:25
QRCode
archive.org
thumbnail

This week, our engine detected two spyware hiding on the Google Play Store and affecting up to 1.5 million users.

pradeo EN Android spyware GooglePlay
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks
07/07/2023 10:20:48
QRCode
archive.org
thumbnail

“Write once, infect everywhere” might be the new cybercrime motto, with newly discovered campaigns showing malicious npm packages powering phishing kits and supply chain attacks.

reversinglabs EN NPM Malicious packages supplychain Supply-Chain-Attack
Hacks targeting British exam boards raise fears of students cheating https://therecord.media/exam-boards-uk-data-breach
06/07/2023 22:47:21
QRCode
archive.org
thumbnail

One incident affected the OCR and Pearson Edexcel examiners, and another hit AQA, Britain's largest exam board.

therecord EN 2023 hacker exam Pearson cheating OCR
FBI digital sting against Hive cybercrime group shows the promise — and limits — of hacking hackers https://www.politico.com/news/2023/07/04/fbi-digital-sting-shows-the-promise-and-limits-of-hacking-hackers-00104545
06/07/2023 14:42:46
QRCode
archive.org
thumbnail

The bureau is trying to take the fight to foreign ransomware gangs, even if it means giving up on bringing some of them behind bars.

politico EN hacking FBI Hive ransomware gangs limits
Port of Nagoya cyberattack: Japanese port paralysed by LockBit https://techmonitor.ai/technology/cybersecurity/port-of-nagoya-cyberattack-lockbit-ransomware
06/07/2023 07:27:53
QRCode
archive.org
thumbnail

Japan’s biggest port, the Port of Nagoya, has been shut down after a cyberattack by the LockBit ransomware gang. The Russian cybercriminals have been on a crime spree this week, claiming ten new victims in the last five days.

techmonitor EN 2023 Port Nagoya LockBit Japan
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection - https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/
05/07/2023 21:58:26
QRCode
archive.org
thumbnail

Threat actors are using increasingly sophisticated forms of evasion and anti-analysis as they respond to increased attention to macOS security in the enterprise.

sentinelone EN 2023 BlueNoroff DPRK macOS RustBucket Evade analysis
Suspected key figure of notorious cybercrime group arrested in joint operation https://www.interpol.int/en/News-and-Events/News/2023/Suspected-key-figure-of-notorious-cybercrime-group-arrested-in-joint-operation
05/07/2023 19:07:32
QRCode
archive.org
thumbnail

Operation Nervone has dealt a significant blow to the OPERA1ER group.

interpol EN 2023 OPERA1ER cybercrime arrested
Clop Ransomware: History, Timeline, And Adversary Simulation https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation
05/07/2023 10:30:44
QRCode
archive.org
thumbnail

The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.

fourcore EN 2023 Cl0p History Timeline TTP ransomware analysis
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising https://thehackernews.com/2023/07/blackcat-operators-distributing.html
05/07/2023 09:30:26
QRCode
archive.org
thumbnail

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application.

thehackernews EN 2023 BlackCat Ransomware Disguised WinSCP Malvertising
Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim https://www.lemagit.fr/actualites/366542375/Campagne-MOVEit-Cl0p-commence-a-divulguer-les-donnees-volees-a-Cegedim
05/07/2023 09:25:43
QRCode
archive.org
thumbnail

Le groupe Cl0p a poursuivi la diffusion des données volées à Cegedim à l’occasion de sa campagne de cyberattaques contre les instances MOVEit Transfer. Il met désormais à disposition plus de 1,5 To de données.

lemagit FR 2023 Cl0p Cegedim ransomware
Au mois de juin, la menace des infostealers n’a pas faibli https://www.lemagit.fr/actualites/366543415/Au-mois-de-juin-la-menace-des-infostealers-na-pas-faibli
04/07/2023 22:31:57
QRCode
archive.org
thumbnail

Plus furtive et discrète que les cyberattaques avec rançongiciel, la menace des maliciels dérobeurs se maintient à un niveau élevé. Panorama de la menace en collaboration avec Sekoia.io.

lemagit FR 2023 infostealers juin2023
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
Chinese Threat Actors Targeting Europe in SmugX Campaign https://research.checkpoint.com/2023/chinese-threat-actors-targeting-europe-in-smugx-campaign/
03/07/2023 21:47:15
QRCode
archive.org
thumbnail

In the last couple of months, Check Point Research (CPR) has been tracking the activity of a Chinese threat actor targeting Foreign Affairs ministries and embassies in Europe. Combined with other Chinese activity previously reported by Check Point Research, this represents a larger trend within the Chinese ecosystem, pointing to a shift to targeting European entities, with a focus on their foreign policy.

The activity described in this report, utilizes HTML Smuggling to target governmental entities in Eastern Europe. This specific campaign has been active since at least December 2022, and is likely a direct continuation of a previously reported campaign attributed to RedDelta (and also to Mustang Panda, to some extent).

checkpoint EN 2023 SmugX Europe research HTML Smuggling MustangPanda
Detecting Popular Cobalt Strike Malleable C2 Profile Techniques https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2/
03/07/2023 21:20:44
QRCode
archive.org
thumbnail

We examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.

unit42 EN 2023 CobaltStrike Malleable C2 Profile Techniques
page 161 / 237
4735 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio