Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 171 / 251
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
10/08/2023 10:11:12
QRCode
archive.org
thumbnail
  • We analyzed Tencent’s Sogou Input Method, which, with over 450 million monthly active users, is the most popular Chinese input method in China.
  • Analyzing the Windows, Android, and iOS versions of the software, we discovered troubling vulnerabilities in Sogou Input Method’s custom-designed “EncryptWall” encryption system and in how it encrypts sensitive data.
  • We found that network transmissions containing sensitive data such as those containing users’ keystrokes are decipherable by a network eavesdropper, revealing what users are typing as they type.
  • We disclosed these vulnerabilities to Sogou developers, who released fixed versions of the affected software as of July 20, 2023 (Windows version 13.7, Android version 11.26, and iOS version 11.25).
  • These findings underscore the importance for software developers in China to use well-supported encryption implementations such as TLS instead of attempting to custom design their own.
citizenlab EN 2023 Sogou Keyboard encryption eavesdropping
Researchers watched 100 hours of hackers hacking honeypot computers https://techcrunch.com/2023/08/09/researchers-watched-100-hours-of-hackers-hacking-honeypot-computers/
10/08/2023 10:04:24
QRCode
archive.org
thumbnail

Imagine being able to sit behind a hacker and observe them take control of a computer and play around with it.

That’s pretty much what two security researchers did thanks to a large network of computers set up as a honeypot for hackers.

The researchers deployed several Windows servers deliberately exposed on the internet, set up with Remote Desktop Protocol, or RDP, meaning that hackers could remotely control the compromised servers as if they were regular users, being able to type and click around.

techcrunch EN 2023 honeypots hackers hacking researchers research honeypot
Interpol takes down 16shop phishing-as-a-service platform https://www.bleepingcomputer.com/news/security/interpol-takes-down-16shop-phishing-as-a-service-platform/
10/08/2023 10:02:02
QRCode
archive.org
thumbnail

A joint operation between Interpol and cybersecurity firms has led to an arrest and shutdown of the notorious 16shop phishing-as-a-service (PhaaS) platform.

bleepingcomputer EN 2023 16shop phishing-as-a-service PhaaS interpol down
Nearly every AMD CPU since 2017 vulnerable to Inception bug https://www.theregister.com/2023/08/09/amd_inception/
10/08/2023 09:59:43
QRCode
archive.org
thumbnail

AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running vulnerable machine.

theregister EN 2023 CVE-2023-20569 AMD CPU processor bug Inception
Electoral Commission apologises for security breach involving UK voters’ data | Electoral Commission | The Guardian https://www.theguardian.com/technology/2023/aug/08/uk-electoral-commission-registers-targeted-by-hostile-hackers
09/08/2023 16:33:23
QRCode
archive.org
thumbnail

Names and addresses of 40 million registered voters were accessible as far back as 2021 after cyber-attack

theguardian 2023 ENK Electoral Commission databreach voters cyber-attack
Pro-Russia Facebook Disinfo Network Targets Francophone Africa https://theintercept.com/2023/08/03/russia-disinformation-africa-facebook/
08/08/2023 09:37:31
QRCode
archive.org

The pages promote Russia’s line on the war in Ukraine to more than 4 million followers, casting doubt on Meta’s pledge to combat foreign influence campaigns.

theintercept EN 2023 Russia Meta Facebook Russia-Ukraine-war influence
The untold history of today’s Russian-speaking hackers https://archive.ph/SypyC
07/08/2023 10:15:51
QRCode
archive.org

Clop, a Russian-speaking hacking group specialising in ransomware, has its own website. Yes, this is a thing — criminals openly encouraging their victims to negotiate a ransom for the return of their data as though it were a legitimate commercial deal.

FT 2023 EN Clop Russian-speaking hacking group ransomware
Spyware maker LetMeSpy shuts down after hacker deletes server data https://techcrunch.com/2023/08/05/letmespy-spyware-shuts-down-wiped-server/
07/08/2023 10:09:02
QRCode
archive.org
thumbnail

A June data breach wiped out the spyware maker's servers

techcrunch EN 2023 LetMeSpy data-breach
Don’t you (forget NLP): Prompt injection with control characters in ChatGPT https://dropbox.tech/machine-learning/prompt-injection-with-control-characters-openai-chatgpt-llm
04/08/2023 09:47:15
QRCode
archive.org
thumbnail

Like many companies, Dropbox has been experimenting with large language models (LLMs) as a potential backend for product and research initiatives. As interest in leveraging LLMs has increased in recent months, the Dropbox Security team has been advising on measures to harden internal Dropbox infrastructure for secure usage in accordance with our AI principles. In particular, we’ve been working to mitigate abuse of potential LLM-powered products and features via user-controlled input.

dropbox EN 2023 ChatGPT LLMs prompt-injection
Midnight Blizzard conducts targeted social engineering over Microsoft Teams https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/
04/08/2023 09:45:26
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats by the threat actor that Microsoft tracks as Midnight Blizzard (previously tracked as NOBELIUM).

microsoft EN 2023 research Social-engineering NOBELIUM MidnightBlizzard Teams
Tenable CEO accuses Microsoft of negligence in addressing security flaw https://cyberscoop.com/tenable-microsoft-negligence-security-flaw/
04/08/2023 09:44:17
QRCode
archive.org
thumbnail

Cybersecurity veteran Amit Yoran says Microsoft has a culture of toxic obfuscation when it comes to addressing security threats.

CyberScoop EN 2023 Amit-Yoran toxic Microsoft
CVE-2023-35082 - MobileIron Core Unauthenticated API Access Vulnerability | Rapid7 Blog https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
04/08/2023 09:42:28
QRCode
archive.org
thumbnail

Rapid7 discovered a new vulnerability that allows unauthenticated attackers to access the API in unsupported versions of MobileIron Core (11.2 and below).

rapid7 EN 2023 CVE-2023-35082 MobileIron Core Unauthenticated API Access Vulnerability
Guarding the Bridge: New Attack Vectors in Azure AD Connect https://blog.sygnia.co/guarding-the-bridge-new-attack-vectors-in-azure-ad-connect
04/08/2023 09:41:15
QRCode
archive.org
thumbnail

By researching Azure AD Connect components, Sygnia was able to discover several attack vectors for extracting Connector credentials and domain users’ NT hashes, while avoiding common security solutions.

sygnia EN 2023 Azure AD Connect Attack Vectors NT hashes
Reptile Malware Targeting Linux Systems https://asec.ahnlab.com/en/55785/
04/08/2023 09:39:49
QRCode
archive.org
thumbnail

Reptile is an open-source kernel module rootkit that targets Linux systems and is publicly available on GitHub. [1] Rootkits are malware that possess the capability to conceal themselves or other malware. They primarily target files, processes, and network communications for their concealment. Reptile’s concealment capabilities include not only its own kernel module but also files, directories, file contents, processes, and network traffic. Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by offering a reverse...

ASEC EN 2023 Reptile open-source kernel module rootkit Linux
Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform https://www.tenable.com/security/research/tra-2023-25
04/08/2023 09:35:57
QRCode
archive.org

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets). Background The issue occurred as a result of insufficient access control to Azure Function hosts, which are launched as part of the creation and operation of custom connectors in Microsoft’s Power Platform (Power Apps, Power Automation).

tenable 2023 EN cross-tenant Cloud Microsoft-Power Platform
Microsoft…The Truth Is Even Worse Than You Think https://www.linkedin.com/pulse/microsoftthe-truth-even-worse-than-you-think-amit-yoran/
04/08/2023 09:35:37
QRCode
archive.org
thumbnail

Last week, Senator Ron Wyden sent a letter to the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Justice and the Federal Trade Commission (FTC) asking that they hold Microsoft accountable for a repeated pattern of negligent cybersecurity practices, which has enabled Chine

Amit-Yoran Microsoft tenable transparency Azure complaint Cloud
Russia-backed hackers used Microsoft Teams to breach government agencies | TechCrunch https://techcrunch.com/2023/08/03/russia-hackers-microsoft-teams-government/
03/08/2023 15:16:48
QRCode
archive.org
thumbnail

Russian state-sponsored hackers posed as technical support staff on Microsoft Teams to compromise dozens of global organizations, including government agencies.

techcrunch EN 2023 state-sponsored hackers technical-support Microsoft Teams APT29
Unpacking the Threats Within: The Hidden Dangers of .zip Domains https://decoded.avast.io/matejkrcma/unpacking-the-threats-within-the-hidden-dangers-of-zip-domains/
01/08/2023 10:38:08
QRCode
archive.org
thumbnail

Let's have a look at the threats brought by introduction of .zip TLD

avast EN 2023 TLD analysis
Into the tank with Nitrogen https://news.sophos.com/en-us/2023/07/26/into-the-tank-with-nitrogen/
31/07/2023 15:09:05
QRCode
archive.org
thumbnail

The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques

sophos analysis EN 2023 Nitrogen Malvertising initial-access
Tomcat Under Attack: Exploring Mirai Malware and Beyond https://blog.aquasec.com/tomcat-under-attack-investigating-the-mirai-malware
31/07/2023 15:02:28
QRCode
archive.org
thumbnail

Tomcat Vulnerability explore some of the techniques used by the Mirai botnet to exploit a single attack directed at one of our Apache Tomcat honeypots.

aquasec EN 2023 Tomcat Mirai botnet Apache
page 171 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn