Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 171 / 237
Deconstructing a Cybersecurity Event https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/
10/05/2023 20:55:43
QRCode
archive.org
thumbnail

Learn more about a failed extortion scheme against Dragos in May 2023. No Dragos systems were breached, including anything related to the Dragos Platform.

dragos EN 2023 lesson-learned incident event extortion
Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms - National Security & Cyber https://www.haaretz.com/israel-news/security-aviation/2023-05-10/ty-article-magazine/.premium/global-surveillance-the-secretive-swiss-dealer-enabling-israeli-spy-firms/00000188-0005-dc7e-a3fe-22cdf2900000
10/05/2023 20:32:58
QRCode
archive.org
thumbnail

The International Mobile System Is Exposed and a Loophole Allows Hackers, Cybercriminals and States to Geolocate Targets and Even Hijack Email and Web Accounts. Israelis Can Be Found Among the Victims - and the Attackers

haaretz EN 2023 privacy surveillance Geolocation Cyber-Warfare Spy Israel-arms-exports Swiss
Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by Russia's Federal Security Service https://www.justice.gov/usao-edny/pr/justice-department-announces-court-authorized-disruption-snake-malware-network
10/05/2023 10:19:07
QRCode
archive.org
thumbnail

“Russia used sophisticated malware to steal sensitive information from our allies, laundering it through a network of infected computers in the United States in a cynical attempt to conceal their crimes.  Meeting the challenge of cyberespionage requires creativity and a willingness to use all lawful means to protect our nation and our allies,” stated United States Attorney Peace.  “The court-authorized remote search and remediation announced today demonstrates my Office and our partners’ commitment to using all of the tools at our disposal to protect the American people.”

justice.gov US 2023 EN Operation-MEDUSA Snake Malware Network FBI cyberespionage espionnage PERSEUS Russia FSB
How macOS now tracks the provenance of apps https://eclecticlight.co/2023/05/10/how-macos-now-tracks-the-provenance-of-apps/
10/05/2023 10:15:36
QRCode
archive.org
thumbnail

Which extended attributes are attached to downloaded archives and apps? How do they fit in with provenance tracking?

eclecticlight EN 2023 macOS attributes how provenance tracking
Snake: Coming soon in Mac OS X flavour – Fox-IT International blog https://blog.fox-it.com/2017/05/03/snake-coming-soon-in-mac-os-x-flavour/
10/05/2023 10:14:46
QRCode
archive.org
thumbnail

Summary Snake, also known as Turla, Uroburos and Agent.BTZ, is a relatively complex malware framework used for targeted attacks. Over the past year Fox-IT has been involved in multiple incident response cases where the Snake framework was used to steal sensitive information. Targets include government institutions, military and large corporates. Researchers who have previously analyzed…

fox-it 2017 EN Snake Turla Uroburos malware framework macos OSX
Hunting Russian Intelligence “Snake” Malware https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a
10/05/2023 09:59:47
QRCode
archive.org

The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB’s ultimate targets. Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

cisa EN 2023 Snake Malware Russia Intelligence FSB espionnage implant PERSEUS
Leaked Intel Boot Guard keys:What happened? How does it affect the software supply chain? https://binarly.io/posts/Leaked_Intel_Boot_Guard_keys_What_happened_How_does_it_affect_the_software_supply_chain/index.html
10/05/2023 09:44:06
QRCode
archive.org

Binarly is the world's most advanced automated firmware supply chain security platform. Using cutting-edge machine-learning techniques, Binary identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.

binarly EN 2023 MSI BootGuard Leaked Intel supplychain
Microsoft May 2023 Patch Tuesday https://isc.sans.edu/diary/Microsoft%20May%202023%20Patch%20Tuesday/29826
10/05/2023 09:42:53
QRCode
archive.org
thumbnail

This month we got patches for 49 vulnerabilities. Of these, 6 are critical, and 2 are already being exploited, according to Microsoft.

One of the exploited vulnerabilities is a Win32k Elevation of Privilege Vulnerability (CVE-2023-29336). This vulnerability has low attack complexity, low privilege, and none user interaction. The attack vector is local, the CVSS is 7.8, and the severity is Important.

sansedu EN 2023 May2023 vulnerabilities PatchTuesday
Microsoft Patch Tuesday, May 2023 Edition https://krebsonsecurity.com/2023/05/microsoft-patch-tuesday-may-2023-edition/
10/05/2023 09:40:56
QRCode
archive.org

Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks.

krebsonsecurity EN 2023 May2023 PatchTuesday
Apple Fails to Fully Reboot iOS Simulator Copyright Case https://news.bloomberglaw.com/ip-law/apple-fails-to-revive-copyright-case-over-iphone-ios-simulator
10/05/2023 09:39:09
QRCode
archive.org
thumbnail

Apple Inc. failed to fully revive a long-running copyright lawsuit against cybersecurity firm Corellium Inc. over its software that simulates the iPhone’s iOS operating systems, letting security researchers identify flaws in the software.

bloomberglaw EN 2023 Apple Corellium
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory https://seclists.org/oss-sec/2023/q2/133
10/05/2023 08:23:43
QRCode
archive.org
thumbnail

An issue has been discovered in the Linux kernel that can be abused by
unprivileged local users to escalate privileges.

The issue is about Netfilter nf_tables accepting some invalid updates
to its configuration.

seclists.org EN 2023 CVE-2023-32233 Linux Kernel Netfilter nf_tables arbitrary memory vulnerability
‘PlugwalkJoe’ pleads guilty for the massive 2020 Twitter hack - The Verge https://www.theverge.com/2023/5/9/23717558/plugwalkjoe-pleads-guilty-twitter-hack-other-crimes-tiktok
10/05/2023 08:03:37
QRCode
archive.org
thumbnail

PlugwalkJoe, aka Joseph James O’Connor, a UK citizen connected to the 2020 Twitter hack affecting many high-profile accounts, including Elon Musk, Joe Biden, Barack Obama, and Apple, has pled guilty to cyberstalking and other crimes. On Tuesday, the Department of Justice (DOJ) announced that O’Connor has been extradited to the US.

theverge EN 2023 PlugwalkJoe Twitter hack Obama Apple extradited UK US
The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services https://www.wired.com/story/big-pipes-ddos-for-hire-fbi/
10/05/2023 08:02:57
QRCode
archive.org
thumbnail

For a decade, a group called Big Pipes has worked behind the scenes with the FBI to target the worst cybercriminal “booter” services plaguing the internet.

WHEN THE FBI announced the takedown of 13 cyberattack-for-hire services yesterday, it may have seemed like just another day in law enforcement’s cat-and-mouse game with a criminal industry that has long plagued the internet’s infrastructure, bombarding victims with relentless waves of junk internet traffic to knock them offline. In fact, it was the latest win for a discreet group of detectives that has quietly worked behind the scenes for nearly a decade with the goal of ending that plague for good.

wired EN 2023 cyberattack-for-hire busted FBI US BigPipes DDoS
On the trail of the Dark Avenger: the most dangerous virus writer in the world https://www.theguardian.com/news/2023/may/09/on-the-trail-of-the-dark-avenger-the-most-dangerous-virus-writer-in-the-world
09/05/2023 08:35:10
QRCode
archive.org
thumbnail

The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?

theguardian En 2023 history Virus Bulgaria DarkAvenger 1980 Viruses
CVE-2023-25394 - VideoStream Local Privilege Escalation https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/
08/05/2023 15:05:55
QRCode
archive.org

Videostream is a user-friendly wireless application designed to stream videos, music, and images to Google Chromecast devices. Boasting simplicity and reliability, this app enables you to wirelessly play any local video file with a single click. Videostream even transcodes audio and video from incompatible files into Chromecast-supported formats.

With over 5 million installations, Videostream has made its mark in the streaming industry. This figure was obtained from their official website (https://getvideostream.com), while the Chrome app store lists 900,000+ users.

danrevah EN 2023 VideoStream LPE CVE-2023-25394 macOS
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability https://patchstack.com/database/vulnerability/advanced-custom-fields-pro/wordpress-advanced-custom-fields-pro-plugin-6-1-5-reflected-cross-site-scripting-xss-vulnerability
08/05/2023 11:18:18
QRCode
archive.org
thumbnail

Rafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Advanced Custom Fields PRO Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has been fixed in version 6.1.6.

patchstack EN 2023 WP CVE-2023-30777 Advanced Custom Fields Pro plugin XSS vulnerability Wordpress plugin
Dump these Cisco phone adapters because it's not fixing them https://www.theregister.com/2023/05/05/cisco_phone_adapter_vulnerabilitty/
08/05/2023 07:16:38
QRCode
archive.org
thumbnail

There is a critical security flaw in a Cisco phone adapter, and the business technology giant says the only step to take is dumping the hardware and migrating to new kit.

In an advisory, Cisco this week warned about the vulnerability in the SPA112 2-Port Adapter that, if exploited, could allow a remote attacker to essentially take control of a compromised device by seizing full privileges and executing arbitrary code.

The flaw, tracked as CVE-2023-20126, is rated as "critical," with a base score o

theregister EN 2023 Cisco CVE-2023-20126 SPA112 2-Port phone adaptor
TikTok spied on me. Why? https://archive.is/gn0r0#selection-2023.0-2027.169
08/05/2023 07:06:39
QRCode
archive.org

One evening in late December last year, I received a cryptic phone call from a PR director at TikTok, the popular social media app. I’d written extensively about the company for the Financial Times, so we’d spoken before. But it was puzzling to hear from her just before the holidays, especially since I wasn’t working on anything related to the company at the time.

Financial-Times EN 2023 TikTok spy journalist
Meet Akira — A new ransomware operation targeting the enterprise https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
07/05/2023 18:35:50
QRCode
archive.org
thumbnail

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.

Akira Data-Leak-Site Extortion Ransomware Security InfoSec Computer-Security
MSI Breach Leaks Intel BootGuard & OEM Image Signing Keys, Compromises Security of Over 200 Devices & Major Vendors https://wccftech.com/msi-breach-leaks-intel-bootguard-oem-image-signing-keys-compromises-security-of-over-200-devices-major-vendors/
07/05/2023 13:36:39
QRCode
archive.org
thumbnail

A recent breach in MSI's servers exposed Intel's BootGuard keys and has now put the security of various devices at risk.

Major MSI Breach Affects The Security of Various Intel Devices
Last month, a hacker group by the name of Money Message revealed that they had breached MSI's servers and stolen 1.5 TBs of data from the company's servers including source code amongst a list of various files that are important to the integrity of the company. The group asked MSI to pay $4.0 million in ransom to avert them from releasing the files to the public but MSI refused the payment.

wccftech EN 2023 MSI leak Intel BootGuard OEM Image Signing Keys
page 171 / 237
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio