Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 173 / 213
4251 résultats taggé E*N  ✕
The OWASSRF + TabShell exploit chain https://blog.viettelcybersecurity.com/tabshell-owassrf/
09/01/2023 23:56:01
QRCode
archive.org
thumbnail

We see that one of our vulnerabilities is exploited in the wild Link. So we decided to public the detail analysis of our two bug chains. Any customer has enough information to mitigate these bugs. The vendor also released all patches a week ago. This blog post shares the detail

viettelcybersecurity EN 2022 Exchange TabShell exploit chain OWASSRF vulnerabilities
New Paper on Old Threema Protocol https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement
09/01/2023 22:50:34
QRCode
archive.org
thumbnail

This is a statement on the NZZ news article from January 9, 2023 about alleged weaknesses in Threema's encryption. But these are completely impractical and theoretical.

threema EN 2023 statement NZZ weaknesses encryption Old Protocol
Three Lessons from Threema: Analysis of a Secure Messenger https://breakingthe3ma.app/
09/01/2023 22:48:01
QRCode
archive.org

Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.

In our work, we present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice.

breakingthe3ma Threema EN 2023 paper vulnerabilies attacks cryptographic protocols
Advertising ID: APPLE DISTRIBUTION INTERNATIONAL fined 8 million euros https://www.cnil.fr/en/advertising-id-apple-distribution-international-fined-8-million-euros
09/01/2023 05:30:39
QRCode
archive.org

On 29 December 2022, the CNIL's restricted committee imposed an administrative fine of 8 million euros on the company APPLE DISTRIBUTION INTERNATIONAL because it did not collect the consent of iPhone's French users (iOS 14.6 version) before depositing and/or writing identifiers used for advertising purposes on their terminals.

CNIL EN 2023 Apple administrative fine collect iPhone France ads advertising
I scanned every package on PyPi and found 57 live AWS keys https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/
07/01/2023 22:21:04
QRCode
archive.org

After inadvertently finding that InfoSys leaked an AWS key on PyPi I wanted to know how many other live AWS keys may be present on Python package index. After scanning every release published to PyPi I found 57 valid access keys from organisations like:

Amazon themselves 😅
Intel
Stanford, Portland and Louisiana University
The Australian Government
General Atomics fusion department
Terradata
Delta Lake
And Top Glove, the worlds largest glove manufacturer 🧤

tomforb EN 2022 leak scan AWS keys PyPi
OPWNAI : Cybercriminals Starting to Use ChatGPT https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/
07/01/2023 11:11:03
QRCode
archive.org

At the end of November 2022, OpenAI released ChatGPT, the new interface for its Large Language Model (LLM), which instantly created a flurry of interest in AI and its possible uses. However, ChatGPT has also added some spice to the modern cyber threat landscape as it quickly became apparent that code generation can help less-skilled threat actors effortlessly launch cyberattacks.

In Check Point Research’s (CPR) previous blog, we described how ChatGPT successfully conducted a full infection flow, from creating a convincing spear-phishing email to running a reverse shell, capable of accepting commands in English. The question at hand is whether this is just a hypothetical threat or if there are already threat actors using OpenAI technologies for malicious purposes.

CPR’s analysis of several major underground hacking communities shows that there are already first instances of cybercriminals using OpenAI to develop malicious tools. As we suspected, some of the cases clearly showed that many cybercriminals using OpenAI have no development skills at all. Although the tools that we present in this report are pretty basic, it’s only a matter of time until more sophisticated threat actors enhance the way they use AI-based tools for bad.

checkpoint EN 2023 research deepweb OpenAI ChatGPT cybercriminals malicious tools
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/
07/01/2023 11:09:04
QRCode
archive.org
thumbnail

Users of underground forums start sharing malware coded by OpenAI’s viral sensation and dating scammers are planning on creating convincing fake girls with the tool. Cyber prognosticators predict more malicious use of ChatGPT is to come.

forbes EN 2023 Cybercriminals Fake Girl Bots deepweb openAI ChatGPT
Schools hit by cyber attack and documents leaked https://www.bbc.com/news/uk-england-gloucestershire-63637883
06/01/2023 15:22:58
QRCode
archive.org
thumbnail

Confidential details including child passport scans and SEN data is published online, the BBC finds.

bbc EN 2023 ViceSociety vice-society schools UK leak ransomware attack education
Twitter leak: 200m+ account database now free to download https://www.theregister.com/2023/01/05/twitter_leak_200m_accounts/
06/01/2023 08:40:58
QRCode
archive.org
thumbnail

No passwords, but plenty of stuff for social engineering and doxxing

theregister 2023 EN Twitter leak download doxxing database
Slack Security Update https://slack.com/intl/en-au/blog/news/slack-security-update
06/01/2023 00:15:12
QRCode
archive.org
thumbnail

Because we take security, privacy, and transparency very seriously, we are sharing the details of a recent incident.

Slack EN 2024 security incident Security-Incident details
Cyberattack shutters the Guardian's office for a month https://www.semafor.com/article/01/03/2023/cyberattack-shutters-the-guardians-office-for-a-month
06/01/2023 00:07:08
QRCode
archive.org
thumbnail

The news organization won't go into detail about what attackers hit, and why.

semafor EN 2023 Guardian ransomware London hack
Meta’s Ad Practices Ruled Illegal Under E.U. Law https://www.nytimes.com/2023/01/04/technology/meta-facebook-eu-gdpr.html
05/01/2023 23:47:40
QRCode
archive.org

The decision is one of the most consequential issued under the E.U.’s landmark data-protection law and creates a new business headwind for the social media giant.

nytimes 2023 EN privacy EU Meta Illegal Ad ruling Facebook WhatsApp Ireland GDPR
CircleCI warns of security breach — rotate your secrets! https://www.bleepingcomputer.com/news/security/circleci-warns-of-security-breach-rotate-your-secrets/
05/01/2023 08:35:09
QRCode
archive.org
thumbnail

CircleCI, a software development service has disclosed a security incident and is urging users to rotate their secrets.

The CI/CD platform touts having a user base comprising more than one million engineers who rely on the service for "speed and reliability" of their builds."speed and reliability" of their builds.

bleepingcomputer EN 2023 CircleCI DevOps Security-Incident
Jenkins discloses dozens of zero-day bugs in multiple plugins https://www.bleepingcomputer.com/news/security/jenkins-discloses-dozens-of-zero-day-bugs-in-multiple-plugins/
05/01/2023 08:28:08
QRCode
archive.org
thumbnail

On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched.

bleepingcomputer EN 2023 CSRF Jenkins Vulnerability XSS Zero-Day Security
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More https://samcurry.net/web-hackers-vs-the-auto-industry/
05/01/2023 07:01:14
QRCode
archive.org
thumbnail

During the fall of 2022, a few friends and I took a road trip from Chicago, IL to Washington, DC to attend a cybersecurity conference and (try) to take a break from our usual computer work.

While we were visiting the University of Maryland, we came across a fleet of electric scooters scattered across the campus and couldn't resist poking at the scooter's mobile app. To our surprise, our actions caused the horns and headlights on all of the scooters to turn on and stay on for 15 minutes straight.

When everything eventually settled down, we sent a report over to the scooter manufacturer and became super interested in trying to more ways to make more things honk. We brainstormed for a while, and then realized that nearly every automobile manufactured in the last 5 years had nearly identical functionality. If an attacker were able to find vulnerabilities in the API endpoints that vehicle telematics systems used, they could honk the horn, flash the lights, remotely track, lock/unlock, and start/stop vehicles, completely remotely.

samcurry EN 2023 Auto Industry Critical Vulnerabilities BMW Rolls Royce Porsche car-hacking API
Chinese researchers claim to have broken RSA with a quantum computer. Experts aren’t so sure. https://therecord.media/chinese-researchers-claim-to-have-broken-rsa-with-a-quantum-computer-experts-arent-so-sure/
04/01/2023 22:15:46
QRCode
archive.org

Researchers in China claim to have reached a breakthrough in quantum computing, figuring out how they can break the RSA public-key encryption system using a quantum computer of around the power that will soon be publicly available.

Breaking 2048-bit RSA — in other words finding a method to consistently and quickly discover the secret prime numbers underpinning the algorithm — would be extremely significant. Although the RSA algorithm itself has largely been replaced in consumer-facing protocols, such as Transport Layer Security, it is still widely used in older enterprise and operational technology software and in many code-signing certificates.

therecord EN 2023 Breaking 2048-bit RSA Quantum computer China
How do you know when macOS detects and remediates malware? https://eclecticlight.co/2023/01/04/how-do-you-know-when-macos-detects-and-remediates-malware/
04/01/2023 21:12:28
QRCode
archive.org
thumbnail

macOS may alert you when you’re trying to open or run a file, with an alert informing you that malware was detected. But what about in scans?

eclecticlight EN 2023 malware alert macos XProtect Remediator
Data of over 200 million Deezer users stolen, leaks on hacking forum https://grahamcluley.com/data-of-over-200-million-deezer-users-stolen-leaks-on-hacking-forum/
04/01/2023 20:59:35
QRCode
archive.org
thumbnail

Music-streaming service Deezer has owned up to a data breach, after hackers managed to steal the data of over 200 million of its users.

grahamcluley EN 2023 Deezer stolen leak
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection/
04/01/2023 18:06:41
QRCode
archive.org
thumbnail

We recently discovered ransomware, which performs MSDTC service DLL Hijacking to silently execute its payload. We have named this ransomware CatB, based on the contact email that the ransomware group uses. The sample was first uploaded to VT on November 23, 2022 and tagged by the VT community as a possible variant of the Pandora Ransomware. The assumed connection to the Pandora Ransomware was due to some similarities between the CatB and Pandora ransom notes. However, the similarities pretty much end there. The CatB ransomware implements several anti-VM techniques to verify execution on a “real machine”, followed by a malicious DLL drop and DLL hijacking to evade detection.

minerva-labs EN 2022 CatB analysis DLL Hijacking Ransomware
Shc Linux Malware Installing CoinMiner https://asec.ahnlab.com/en/45182/
04/01/2023 12:14:36
QRCode
archive.org
thumbnail

The ASEC analysis team recently discovered that a Linux malware developed with Shc has been installing a CoinMiner. It is presumed that after successful authentication through a dictionary attack on inadequately managed Linux SSH servers, various malware were installed on the target system. Among those installed were the Shc downloader, XMRig CoinMiner installed through the former, and DDoS IRC Bot, developed with Perl.

asec 2023 EN Shell Script Compiler analysis Linux Malware CoinMiner Shc
page 173 / 213
4834 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn