Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 174 / 237
World's largest cyber defense exercise Locked Shields brings together over 3000 participants https://ccdcoe.org/news/2023/6016/
22/04/2023 09:29:53
QRCode
archive.org

Tallinn, Estonia – From 18 to 21 April, the NATO Cooperative Cyber Defense Center of Excellence (CCDCOE) is hosting Locked Shields 2023, the world’s largest live-fire cyber defense exercise. Over 3,000 participants from 38 nations are taking part in the exercise, which involves protecting real computer systems from real-time attacks and simulating tactical and strategic decisions in critical situations.

ccdcoe EN 2023 NATO Cooperative CyberDefense exercise
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain
21/04/2023 23:25:08
QRCode
archive.org
thumbnail

North Korean-linked operation affected more organizations beyond 3CX, including two critical infrastructure organizations in the energy sector.

symantec EN 2023 North North-Korea 3CX X_Trader Supply-Chain-Attack
Critical Vulnerabilities in PaperCut Print Management Software https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
21/04/2023 23:00:09
QRCode
archive.org

Our team is tracking in-the-wild exploitation of zero-day vulnerabilities against PaperCut MF/NG which allow for unauthenticated remote code execution due to an authentication bypass.

huntress EN 2023 PaperCut zero-day RCE Print Management Software
Retour d'experience du Centre Hospitalier de Cahors https://www.cyberveille-sante.gouv.fr/liste/retex/cahors
21/04/2023 18:52:32
QRCode
archive.org
thumbnail

Le CERT Santé revient sur la cyberattaque du centre hospitalier de Cahors suite à l’exploitation d’une faille de sécurité.  

CERTSanté FR 2023 LessonsLearned cyberattaque Cahors hospital Santé
'RustBucket' malware targets macOS https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
21/04/2023 17:30:05
QRCode
archive.org
thumbnail

Learn how APT group, BlueNoroff, targets Apple with malware variant to compromise macOS devices.

jamf EN 2023 macOS BlueNoroff RustBucket malware analysis
3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/
21/04/2023 08:44:36
QRCode
archive.org

We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex, lengthy intrusion that has the makings of a cyberpunk spy novel: North Korean hackers using legions of fake executive accounts…

krebsonsecurity EN 2023 3CX Double Supply-Chain-Attack North North-Korea
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
21/04/2023 08:43:29
QRCode
archive.org
thumbnail

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.

welivesecurity EN 2023 3CX Lazarus Operation DreamJob
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
20/04/2023 14:04:45
QRCode
archive.org
thumbnail

A software supply chain attack led to another software supply chain attack.

mandiant EN 2023 3CX analysis Supply-Chain-Attack
Threat Actors Rapidly Adopt Web3 IPFS Technology https://unit42.paloaltonetworks.com/ipfs-used-maliciously/
19/04/2023 23:00:08
QRCode
archive.org
thumbnail

Web3 technologies are seeing widespread adoption — including by TAs. We discuss Web3 technology InterPlanetary File System (IPFS), and malicious use of it.

unit42 EN 2023 paloalto IPFS malicious use Web3
‘AuKill’ EDR killer malware abuses Process Explorer driver https://news.sophos.com/en-us/2023/04/19/aukill-edr-killer-malware-abuses-process-explorer-driver/
19/04/2023 20:16:14
QRCode
archive.org
thumbnail

Driver based attacks against security products are on the rise

sophos EN 2023 Procexp.sys aukill EDR
TikTok reste autorisé sur les téléphones des fonctionnaires suisses https://www.rts.ch/info/suisse/13953271-tiktok-reste-autorise-sur-les-telephones-des-fonctionnaires-suisses.html
19/04/2023 17:31:12
QRCode
archive.org
thumbnail

Après d'intenses semaines de réflexion, de clarifications internes et d'enquêtes techniques, l'administration fédérale a décidé de ne pas bannir TikTok des téléphones de fonction. Une décision à contre-courant de nombreux pays européens.

rts FR CH Suisse TikTok autorise
Cybersécurité et désinformation: Berne crée un nouveau Secrétariat d’État pour la sécurité civile https://www.24heures.ch/berne-cree-un-nouveau-secretariat-detat-pour-la-securite-civile-800155170399
19/04/2023 14:24:46
QRCode
archive.org
thumbnail

Pour lutter contre les nouvelles menaces, le Conseil fédéral veut renforcer le Département fédéral de la défense en créant un nouvel organe spécialisé.

24heures CH FR Secrétariat sécurité civile désinformation Suisse
Black Basta claims it's selling off stolen Capita data https://www.theregister.com/2023/04/18/capita_breach_gets_worse/
19/04/2023 11:41:34
QRCode
archive.org
thumbnail

No worries, outsourcer only handles government tech contracts worth billions

theregister EN 2023 BlackBasta Capita ransomware
ntpd is not vulnerable · Issue #1 · spwpun/ntp-4.2.8p15-cves https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1
19/04/2023 11:39:34
QRCode
archive.org

The first four of these CVEs affect a function in libntp that is only used by ntpq, but not by ntpd. The last CVE affects the driver for a hardware clock (GPS receiver), so ntpd might be vulnerable...

spwpun EN 2023 libntp ntp ntpd ntp-4.2.8p15 CVE-2023-26551 CVE-2023-26552 CVE-2023-26553 CVE-2023-26554 CVE-2023-26555
in2al5d p3in4er is Almost Completely Undetectable https://blog.morphisec.com/in2al5d-p3in4er
19/04/2023 10:52:34
QRCode
archive.org
thumbnail

in2al5d p3in4er is a highly evasive new loader that has a detection ratio of 0 on VirusTotal. We explain how it works, and how to prevent it.

morphisec EN 2023 analysis malware-analysis in2al5d p3in4er Undetectable
LockBit for Mac | How Real is the Risk of macOS Ransomware? https://www.sentinelone.com/blog/lockbit-for-mac-how-real-is-the-risk-of-macos-ransomware/
19/04/2023 08:50:03
QRCode
archive.org
thumbnail

Discovery of a macOS variant of LockBit has caused alarm, but how serious a threat is it? We explore the malware and the threat of ransomware on Apple Macs.

sentinelone EN 2023 macOS LockBit analysis
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch https://techcrunch.com/2023/04/18/apple-lockdown-mode-iphone-nso-pegasus/
19/04/2023 08:42:58
QRCode
archive.org
thumbnail

Apple has fixed the three exploits used to deploy the Pegasus spyware, which did not require any interaction from the target.

techcrunch EN 2023 apple citizen-lab ios iphone malware nso nso-group spyware LockdownMode
Summary of the Investigation Related to CVE-2023-0669 https://www.fortra.com/blog/summary-investigation-related-cve-2023-0669
18/04/2023 20:35:58
QRCode
archive.org
thumbnail

We’d like to provide an update on our investigation into the suspicious activity detected in our Fortra GoAnywhere MFT solution. Working with Unit 42, we have completed our investigation and have compiled a factual summary of the investigation, as well as continuous improvement actions Fortra is taking to further strengthen our systems and recommended actions customers can take to secure their data and improve their security posture using available features in the GoAnywhere MFT solution.

Fortra EN 2023 CVE-2023-0669 investigation GoAnywhere MFT summary
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
18/04/2023 16:00:59
QRCode
archive.org
thumbnail

One widely publicized case of disappearances relevant to this case of spyware infection occurred in September 2015 when a group of 43 students at a teacher

citizenlab EN 2023 NSO Pegasus Spyware PWNYOURHOME FINDMYPWN
QBot banker delivered through business correspondence https://securelist.com/qbot-banker-business-correspondence/109535/
17/04/2023 22:18:33
QRCode
archive.org
thumbnail

In early April, we detected a significant increase in attacks that use banking Trojans of the QBot family. The malware would be delivered through e-mails that were based on real business letters the attackers had gotten access to.

securelist EN 2023 Malware QakBot Thematic-phishing Trojan-Banker analysis
page 174 / 237
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio